Sciweavers

5344 search results - page 275 / 1069
» Privacy-Preserving Set Operations
Sort
View
COLING
2008
15 years 5 months ago
Stopping Criteria for Active Learning of Named Entity Recognition
Active learning is a proven method for reducing the cost of creating the training sets that are necessary for statistical NLP. However, there has been little work on stopping crit...
Florian Laws, Hinrich Schütze
128
Voted
DAGSTUHL
2007
15 years 5 months ago
Choosing Your Beliefs
Abstract This paper presents and discusses a novel approach to indeterministic belief revision. An indeterministic belief revision operator assumes that, when an agent is confronte...
Guido Boella, Célia da Costa Pereira, Gabri...
VMV
2008
197views Visualization» more  VMV 2008»
15 years 5 months ago
1-2-tree: Semantic Modeling and Editing of Trees
In computer graphics, procedural methods and Lsystems are common approaches to model complex botanical trees. In contrast to previous tree modeling systems, we propose linking rul...
Björn Ganster, Reinhard Klein
COOP
2004
15 years 5 months ago
A decision support framework for cooperation in make-to-order production
This paper proposes a method which assists the firms for cooperating in make-to-order production. We especially focus on the operational decision levels of manufacturing companies ...
Emmanuelle Monsarrat, Cyril Briand, Patrick Esquir...
LISA
2004
15 years 5 months ago
More Netflow Tools for Performance and Security
Analysis of network traffic is becoming increasingly important, not just for determining network characteristics and anticipating requirements, but also for security analysis. Sev...
Carrie Gates, Michael Collins, Michael Duggan, And...