Sciweavers

901 search results - page 128 / 181
» On Anonymization of String Data
Sort
View
ALGORITHMICA
2010
164views more  ALGORITHMICA 2010»
15 years 1 months ago
Space Efficient Algorithms for the Burrows-Wheeler Backtransformation
The Burrows-Wheeler transformation is used for effective data compression, e.g., in the well known program bzip2. Compression and decompression are done in a block-wise fashion; la...
Ulrich Lauther, Tamás Lukovszki
CJ
1999
95views more  CJ 1999»
15 years 1 months ago
Two Kinds of Probabilistic Induction
Problems in probabilistic induction are of two general kinds. In the first, we have a linearly ordered sequence of symbols that must be extrapolated. In the second we want to extr...
Ray J. Solomonoff
JOT
2010
113views more  JOT 2010»
14 years 12 months ago
SOA Web Security and Applications
entional vulnerability detection fails to extend its generic form to an abstract level in coping with particular type of string validation. Consequently the security bypasses key ...
Raymond Wu, Masayuki Hisada
ACL
2009
14 years 11 months ago
A Succinct N-gram Language Model
Efficient processing of tera-scale text data is an important research topic. This paper proposes lossless compression of Ngram language models based on LOUDS, a succinct data stru...
Taro Watanabe, Hajime Tsukada, Hideki Isozaki
ACL
2012
13 years 3 months ago
Learning Translation Consensus with Structured Label Propagation
In this paper, we address the issue for learning better translation consensus in machine translation (MT) research, and explore the search of translation consensus from similar, r...
Shujie Liu, Chi-Ho Li, Mu Li, Ming Zhou