Sciweavers

2006 search results - page 156 / 402
» Heuristic Security-Testing Methods
Sort
View
110
Voted
NAACL
2007
15 years 2 months ago
Chinese Named Entity Recognition with Cascaded Hybrid Model
We propose a high-performance cascaded hybrid model for Chinese NER. Firstly, we use Boosting, a standard and theoretically wellfounded machine learning method to combine a set of...
Xiaofeng Yu
92
Voted
AAAI
2004
15 years 2 months ago
An Effective Algorithm for Project Scheduling with Arbitrary Temporal Constraints
The resource-constrained project scheduling problem with time windows (RCPSP/max) is an important generalization of a number of well studied scheduling problems. In this paper, we...
Tristan B. Smith, John M. Pyle
77
Voted
FLAIRS
2004
15 years 2 months ago
Analysis of Rule Refinement Conflicts
There exists no methodical standard for conflict analysis in the selection of optimal rule refinements. Current rule base refinement systems select the best rule refinements out o...
Hans-Werner Kelbassa
IADIS
2004
15 years 2 months ago
Organizing the Web: Semi-Automatic Construction of a Faceted Scheme
In this study, we explore the construction of a faceted vocabulary that can be used as a mechanism for organizing Web-based resources. After analyzing the manual process of facete...
Kiduk Yang, Elin K. Jacob, Aaron Loehrlein, Seungm...
96
Voted
FLAIRS
2006
15 years 2 months ago
Deverbal Nouns in Knowledge Representation
Deverbal nouns pose serious challenges for knowledgerepresentation systems. We present a method of canonicalizing deverbal noun representations, relying on a rich lexicon of verb ...
Olga Gurevich, Richard S. Crouch, Tracy H. King, V...