Sciweavers

5544 search results - page 890 / 1109
» Three Inadequate Models
Sort
View
122
Voted
DGO
2007
123views Education» more  DGO 2007»
15 years 5 months ago
Cross-national information policy conflict regarding access to information: building a conceptual framework
This paper addresses cross-national information policy conflict regarding access to information. This type of information policy conflict appears more complex and controversial th...
Lei Zheng
131
Voted
LREC
2010
155views Education» more  LREC 2010»
15 years 5 months ago
Automatic Acquisition of Chinese Novel Noun Compounds
Automatic acquisition of novel compounds is notoriously difficult because most novel compounds have relatively low frequency in a corpus. The current study proposes a new method t...
Meng Wang, Chu-Ren Huang, Shiwen Yu, Weiwei Sun
135
Voted
DIMVA
2008
15 years 5 months ago
Learning and Classification of Malware Behavior
Malicious software in form of Internet worms, computer viruses, and Trojan horses poses a major threat to the security of networked systems. The diversity and amount of its variant...
Konrad Rieck, Thorsten Holz, Carsten Willems, Patr...
130
Voted
LREC
2010
206views Education» more  LREC 2010»
15 years 5 months ago
FreeLing 2.1: Five Years of Open-source Language Processing Tools
FreeLing is an open-source multilingual language processing library providing a wide range of language analyzers for several languages. It offers text processing and language anno...
Lluís Padró, Miquel Collado, Samuel ...
118
Voted
EMNLP
2008
15 years 5 months ago
Scaling Textual Inference to the Web
Most Web-based Q/A systems work by finding pages that contain an explicit answer to a question. These systems are helpless if the answer has to be inferred from multiple sentences...
Stefan Schoenmackers, Oren Etzioni, Daniel S. Weld