Sciweavers

2949 search results - page 260 / 590
» Universal Sparse Modeling
Sort
View
143
Voted
IJCNLP
2005
Springer
15 years 9 months ago
Empirical Study of Utilizing Morph-Syntactic Information in SMT
In this paper, we present an empirical study that utilizes morph-syntactical information to improve translation quality. With three kinds of language pairs matched according to mor...
Young-Sook Hwang, Taro Watanabe, Yutaka Sasaki
156
Voted
IJCNLP
2005
Springer
15 years 9 months ago
A Chunking Strategy Towards Unknown Word Detection in Chinese Word Segmentation
This paper proposes a chunking strategy to detect unknown words in Chinese word segmentation. First, a raw sentence is pre-segmented into a sequence of word atoms 1 using a maximum...
Guodong Zhou
JMLR
2012
13 years 6 months ago
A Bayesian Analysis of the Radioactive Releases of Fukushima
The Fukushima Daiichi disaster 11 March, 2011 is considered the largest nuclear accident since the 1986 Chernobyl disaster and has been rated at level 7 on the International Nucle...
Ryota Tomioka, Morten Mørup
170
Voted
ASIAMS
2007
IEEE
15 years 10 months ago
Rough-Fuzzy Granulation, Rough Entropy and Image Segmentation
This talk has two parts explaining the significance of Rough sets in granular computing in terms of rough set rules and in uncertainty handling in terms of lower and upper approxi...
Sankar K. Pal
SODA
2008
ACM
110views Algorithms» more  SODA 2008»
15 years 5 months ago
Why simple hash functions work: exploiting the entropy in a data stream
Hashing is fundamental to many algorithms and data structures widely used in practice. For theoretical analysis of hashing, there have been two main approaches. First, one can ass...
Michael Mitzenmacher, Salil P. Vadhan