Sciweavers

398 search results - page 44 / 80
» Query by output
Sort
View
DEBU
2010
139views more  DEBU 2010»
14 years 9 months ago
Refining Information Extraction Rules using Data Provenance
Developing high-quality information extraction (IE) rules, or extractors, is an iterative and primarily manual process, extremely time consuming, and error prone. In each iteratio...
Bin Liu 0002, Laura Chiticariu, Vivian Chu, H. V. ...
ICML
2006
IEEE
16 years 19 days ago
Bayesian regression with input noise for high dimensional data
This paper examines high dimensional regression with noise-contaminated input and output data. Goals of such learning problems include optimal prediction with noiseless query poin...
Jo-Anne Ting, Aaron D'Souza, Stefan Schaal
BMCBI
2005
134views more  BMCBI 2005»
14 years 11 months ago
Windows .NET Network Distributed Basic Local Alignment Search Toolkit (W.ND-BLAST)
Background: BLAST is one of the most common and useful tools for Genetic Research. This paper describes a software application we have termed Windows .NET Distributed Basic Local ...
Scot E. Dowd, Joaquin Zaragoza, Javier R. Rodrigue...
DBPL
2007
Springer
100views Database» more  DBPL 2007»
15 years 6 months ago
Provenance as Dependency Analysis
Abstract. Provenance is information recording the source, derivation, or history of some information. Provenance tracking has been studied in a variety of settings; however, althou...
James Cheney, Amal Ahmed, Umut A. Acar
FSE
2005
Springer
117views Cryptology» more  FSE 2005»
15 years 5 months ago
Security Analysis of a 2/3-Rate Double Length Compression Function in the Black-Box Model
Abstract. In this paper, we propose a 2/3-rate double length compression function and study its security in the black-box model. We prove that to get a collision attack for the com...
Mridul Nandi, Wonil Lee, Kouichi Sakurai, Sangjin ...