Sciweavers

359 search results - page 50 / 72
» Supporting Real World Security Models in Java
Sort
View
COLING
2010
14 years 6 months ago
Open Entity Extraction from Web Search Query Logs
In this paper we propose a completely unsupervised method for open-domain entity extraction and clustering over query logs. The underlying hypothesis is that classes defined by mi...
Alpa Jain, Marco Pennacchiotti
FC
2004
Springer
129views Cryptology» more  FC 2004»
15 years 5 months ago
A Privacy-Friendly Loyalty System Based on Discrete Logarithms over Elliptic Curves
Abstract. Systems for the support of customer relationship management are becoming increasingly attractive for vendors. Loyalty systems provide an interesting possibility for vendo...
Matthias Enzmann, Marc Fischlin, Markus Schneider ...
AIPS
2010
15 years 2 months ago
Shopper: A System for Executing and Simulating Expressive Plans
We present Shopper, a plan execution engine that facilitates experimental evaluation of plans and makes it easier for planning researchers to incorporate replanning. Shopper inter...
Robert P. Goldman, John Maraist
INFORMATICALT
2002
91views more  INFORMATICALT 2002»
14 years 11 months ago
Bayesian Heuristic Approach to Scheduling
Abstract. Real life scheduling problems are solved by heuristics with parameters defined by experts, as usual. In this paper a new approach is proposed where the parameters of vari...
Jonas Mockus
AAAI
2008
15 years 2 months ago
Learning and Inference with Constraints
Probabilistic modeling has been a dominant approach in Machine Learning research. As the field evolves, the problems of interest become increasingly challenging and complex. Makin...
Ming-Wei Chang, Lev-Arie Ratinov, Nicholas Rizzolo...