Sciweavers

5544 search results - page 901 / 1109
» Three Inadequate Models
Sort
View
157
Voted
EMNLP
2008
15 years 4 months ago
Mention Detection Crossing the Language Barrier
While significant effort has been put into annotating linguistic resources for several languages, there are still many left that have only small amounts of such resources. This p...
Imed Zitouni, Radu Florian
127
Voted
GECCO
2008
Springer
155views Optimization» more  GECCO 2008»
15 years 4 months ago
Modularity and symmetry in computational embryogeny
Modularity and symmetry are two properties observed in almost every engineering and biological structure. The origin of these properties in nature is still unknown. Yet, as engine...
Or Yogev, Andrew A. Shapiro, Erik K. Antonsson
106
Voted
ICML
2010
IEEE
15 years 4 months ago
Deep Supervised t-Distributed Embedding
Deep learning has been successfully applied to perform non-linear embedding. In this paper, we present supervised embedding techniques that use a deep network to collapse classes....
Martin Renqiang Min, Laurens van der Maaten, Zinen...
123
Voted
RECSYS
2010
ACM
15 years 3 months ago
Recommending based on rating frequencies
Since the development of the comparably simple neighborhood-based methods in the 1990s, a plethora of techniques has been developed to improve various aspects of collaborative fil...
Fatih Gedikli, Dietmar Jannach
149
Voted
CCS
2010
ACM
15 years 3 months ago
Accountability: definition and relationship to verifiability
Many cryptographic tasks and protocols, such as non-repudiation, contract-signing, voting, auction, identity-based encryption, and certain forms of secure multi-party computation,...
Ralf Küsters, Tomasz Truderung, Andreas Vogt