Sciweavers

2006 search results - page 195 / 402
» MUC-5 evaluation metrics
Sort
View
MTA
2010
175views more  MTA 2010»
15 years 11 days ago
Automatic summarization of rushes video using bipartite graphs
In this paper we present a new approach for automatic summarization of rushes video. Our approach is composed of three main steps. First, based on a temporal segmentation, we filte...
Liang Bai, Yan-Li Hu, Songyang Lao, Alan F. Smeato...
DASFAA
2011
IEEE
341views Database» more  DASFAA 2011»
14 years 11 months ago
Utility-Oriented K-Anonymization on Social Networks
\Identity disclosure" problem on publishing social network data has gained intensive focus from academia. Existing k-anonymization algorithms on social network may result in n...
Yazhe WANG, Long XIE, Baihua ZHENG, and Ken C. K. ...
EEE
2004
IEEE
15 years 5 months ago
Spreading Activation Models for Trust Propagation
Semantic Web endeavors have mainly focused on issues pertaining to knowledge representation and ontology design. However, besides understanding information metadata stated by subj...
Cai-Nicolas Ziegler, Georg Lausen
WSC
2004
15 years 3 months ago
Fast Model-Based Penetration Testing
Traditional approaches to security evaluation have been based on penetration testing of real systems, or analysis of formal models of such systems. The former suffer from the prob...
Sankalp Singh, James Lyons, David M. Nicol
86
Voted
NAACL
2001
15 years 3 months ago
Edit Detection and Parsing for Transcribed Speech
We present a simple architecture for parsing transcribed speech in which an edited-word detector first removes such words from the sentence string, and then a standard statistical...
Eugene Charniak, Mark Johnson