Sciweavers

6434 search results - page 1109 / 1287
» Model Transformations with Reference Models
Sort
View
145
Voted
CCS
2008
ACM
15 years 5 months ago
User-controllable learning of security and privacy policies
Studies have shown that users have great difficulty specifying their security and privacy policies in a variety of application domains. While machine learning techniques have succ...
Patrick Gage Kelley, Paul Hankes Drielsma, Norman ...
PODS
2010
ACM
228views Database» more  PODS 2010»
15 years 5 months ago
Capturing missing tuples and missing values
Databases in real life are often neither entirely closed-world nor entirely open-world. Indeed, databases in an enterprise are typically partially closed, in which a part of the d...
Wenfei Fan, Floris Geerts
LREC
2010
213views Education» more  LREC 2010»
15 years 4 months ago
Extensive Evaluation of a FrameNet-WordNet mapping resource
Lexical resources are basic components of many text processing system devoted to information extraction, question answering or dialogue. In paste years many resources have been de...
Diego De Cao, Danilo Croce, Roberto Basili
136
Voted
LREC
2008
159views Education» more  LREC 2008»
15 years 4 months ago
Evaluation of Context-Dependent Phrasal Translation Lexicons for Statistical Machine Translation
We present new direct data analysis showing that dynamically-built context-dependent phrasal translation lexicons are more useful resources for phrase-based statistical machine tr...
Marine Carpuat, Dekai Wu
144
Voted
TRECVID
2008
15 years 4 months ago
University of Sheffield at TRECVID 2008: Rushes Summarisation and Video Copy Detection
This paper presents our experiments on TRECVID workshop 2008. This year we participated in two challenging tasks, rushes video summarisation and video copy detection tasks. We stu...
Siripinyo Chantamunee, Yoshihiko Gotoh
« Prev « First page 1109 / 1287 Last » Next »