Sciweavers

398 search results - page 44 / 80
» Query by output
Sort
View
146
Voted
DEBU
2010
139views more  DEBU 2010»
15 years 28 days ago
Refining Information Extraction Rules using Data Provenance
Developing high-quality information extraction (IE) rules, or extractors, is an iterative and primarily manual process, extremely time consuming, and error prone. In each iteratio...
Bin Liu 0002, Laura Chiticariu, Vivian Chu, H. V. ...
115
Voted
ICML
2006
IEEE
16 years 4 months ago
Bayesian regression with input noise for high dimensional data
This paper examines high dimensional regression with noise-contaminated input and output data. Goals of such learning problems include optimal prediction with noiseless query poin...
Jo-Anne Ting, Aaron D'Souza, Stefan Schaal
148
Voted
BMCBI
2005
134views more  BMCBI 2005»
15 years 3 months ago
Windows .NET Network Distributed Basic Local Alignment Search Toolkit (W.ND-BLAST)
Background: BLAST is one of the most common and useful tools for Genetic Research. This paper describes a software application we have termed Windows .NET Distributed Basic Local ...
Scot E. Dowd, Joaquin Zaragoza, Javier R. Rodrigue...
119
Voted
DBPL
2007
Springer
100views Database» more  DBPL 2007»
15 years 9 months ago
Provenance as Dependency Analysis
Abstract. Provenance is information recording the source, derivation, or history of some information. Provenance tracking has been studied in a variety of settings; however, althou...
James Cheney, Amal Ahmed, Umut A. Acar
130
Voted
FSE
2005
Springer
117views Cryptology» more  FSE 2005»
15 years 9 months ago
Security Analysis of a 2/3-Rate Double Length Compression Function in the Black-Box Model
Abstract. In this paper, we propose a 2/3-rate double length compression function and study its security in the black-box model. We prove that to get a collision attack for the com...
Mridul Nandi, Wonil Lee, Kouichi Sakurai, Sangjin ...