Sciweavers

3318 search results - page 413 / 664
» The Weak Instance Model
Sort
View
LREC
2010
159views Education» more  LREC 2010»
15 years 5 months ago
Bootstrapping Language Neutral Term Extraction
A variety of methods exist for extracting terms and relations between terms from a corpus, each of them having strengths and weaknesses. Rather than just using the joint results, ...
Wauter Bosma, Piek Vossen
145
Voted
PST
2008
15 years 5 months ago
The Uncertainty of the Truth
Can we trust without any reliable truth information? Most trust architectures work in a similar way: a trustor makes some observations, rates the trustee, and makes recommendations...
Michel Deriaz
ECIS
2004
15 years 5 months ago
From intranets to wrestling information infrastructures
This study explores intranets as information infrastructure and this conceptualization is supported by evidence from three interpretive case studies. If an intranet is considered ...
Brian O'Flaherty, Jason Whalley
ICVGIP
2004
15 years 5 months ago
Cursive Word Recognition Using a Novel Feature Extraction Method and a Neural Network
In this paper, we present a holistic system for the recognition of cursive handwriting that utilizes a novel feature extraction method and a neural network. The Hough transform is...
José Ruiz-Pinales, René Jaime-Rivas
CIDR
2003
123views Algorithms» more  CIDR 2003»
15 years 5 months ago
A Case for Staged Database Systems
Traditional database system architectures face a rapidly evolving operating environment, where millions of users store and access terabytes of data. In order to cope with increasi...
Stavros Harizopoulos, Anastassia Ailamaki