Sciweavers

2972 search results - page 453 / 595
» The generic information extraction system
Sort
View
SIGIR
2004
ACM
15 years 4 months ago
Context sensitive vocabulary and its application in protein secondary structure prediction
Protein secondary structure prediction is an important step towards understanding the relation between protein sequence and structure. However, most current prediction methods use...
Yan Liu, Jaime G. Carbonell, Judith Klein-Seethara...
CIKM
2001
Springer
15 years 3 months ago
Automatic Discovery of Salient Segments in Imperfect Speech Transcripts
This paper addresses the problem of automatic detection of salient video segments for real-world applications such as corporate training based on associated speech transcriptions....
Dulce B. Ponceleon, Savitha Srinivasan
89
Voted
TSE
2008
128views more  TSE 2008»
14 years 10 months ago
Analyzing Regulatory Rules for Privacy and Security Requirements
Information practices that use personal, financial, and health-related information are governed by US laws and regulations to prevent unauthorized use and disclosure. To ensure com...
Travis D. Breaux, Annie I. Antón
WEBI
2010
Springer
14 years 8 months ago
On Using Query Logs for Static Index Pruning
Static index pruning techniques aim at removing from the posting lists of an inverted file the references to documents which are likely to be not relevant for answering user querie...
Hoang Thanh Lam, Raffaele Perego, Fabrizio Silvest...
98
Voted
CISC
2009
Springer
174views Cryptology» more  CISC 2009»
14 years 8 months ago
Algebraic Side-Channel Attacks
Abstract. In 2002, algebraic attacks using overdefined systems of equations have been proposed as a potentially very powerful cryptanalysis technique against block ciphers. However...
Mathieu Renauld, François-Xavier Standaert