Sciweavers

745 search results - page 123 / 149
» Named Entity WordNet
Sort
View
INFOCOM
2005
IEEE
15 years 3 months ago
Optimizing cost-sensitive trust-negotiation protocols
Trust negotiation is a process that establishes mutual trust by the exchange of digital credentials and/or guiding policies among entities who may have no pre-existing knowledge a...
Weifeng Chen, L. Clarke, James F. Kurose, Donald F...
XIMEP
2005
ACM
155views Database» more  XIMEP 2005»
15 years 3 months ago
Deep Set Operators for XQuery
There are three set operators defined in XQuery, namely union, intersect and except. They take node sequences as operands, in which each node is identified by its node-ID and tr...
Bo Luo, Dongwon Lee, Wang-Chien Lee, Peng Liu
FSMNLP
2005
Springer
15 years 3 months ago
Algorithms for Minimum Risk Chunking
Abstract. Stochastic finite automata are useful for identifying substrings (chunks) within larger units of text. Relevant applications include tokenization, base-NP chunking, name...
Martin Jansche
ICICS
2005
Springer
15 years 3 months ago
Generic Construction of (Identity-Based) Perfect Concurrent Signatures
The notion of concurrent signatures was recently introduced by Chen, Kudla and Paterson. In concurrent signature schemes, two entities can produce two signatures that are not bindi...
Sherman S. M. Chow, Willy Susilo
KES
2005
Springer
15 years 3 months ago
gProt: Annotating Protein Interactions Using Google and Gene Ontology
With the increasing amount of biomedical literature, there is a need for automatic extraction of information to support biomedical researchers. Due to incomplete biomedical informa...
Rune Sætre, Amund Tveit, Martin Thorsen Rana...