Sciweavers

1167 search results - page 48 / 234
» On the Evaluation of Entity Profiles
Sort
View
CIKM
2008
Springer
14 years 11 months ago
A proposal for chemical information retrieval evaluation
Based on the important progresses made in information retrieval (IR) in terms of theoretical models and evaluations, more and more attention has recently been paid to the research...
Jianhan Zhu, John Tait
ACL
2008
14 years 11 months ago
Semantic Types of Some Generic Relation Arguments: Detection and Evaluation
This paper presents an approach to detection of the semantic types of relation arguments employing the WordNet hierarchy. Using the SemEval-2007 data, we show that the method allo...
Sophia Katrenko, Pieter W. Adriaans
PST
2008
14 years 11 months ago
AttributeTrust A Framework for Evaluating Trust in Aggregated Attributes via a Reputation System
To enable a rich attribute-based authorization system, it is desirable that a large number of user attributes are available, possibly provided by multiple entities. The user may b...
Apurva Mohan, Douglas M. Blough
KDD
2005
ACM
119views Data Mining» more  KDD 2005»
15 years 3 months ago
LIPED: HMM-based life profiles for adaptive event detection
In this paper, the proposed LIPED (LIfe Profile based Event Detection) employs the concept of life profiles to predict the activeness of event for effective event detection. A gro...
Chien Chin Chen, Meng Chang Chen, Ming-Syan Chen
ACNS
2009
Springer
150views Cryptology» more  ACNS 2009»
15 years 1 months ago
How to Compare Profiled Side-Channel Attacks?
Side-channel attacks are an important class of attacks against cryptographic devices and profiled side-channel attacks are the most powerful type of side-channel attacks. In this s...
François-Xavier Standaert, François ...