Sciweavers

390 search results - page 16 / 78
» Use It or Lose It
Sort
View
COLING
2008
15 years 14 days ago
Two-Phased Event Relation Acquisition: Coupling the Relation-Oriented and Argument-Oriented Approaches
Addressing the task of acquiring semantic relations between events from a large corpus, we first argue the complementarity between the pattern-based relation-oriented approach and...
Shuya Abe, Kentaro Inui, Yuji Matsumoto
CORR
2004
Springer
223views Education» more  CORR 2004»
14 years 11 months ago
Better Foreground Segmentation Through Graph Cuts
For many tracking and surveillance applications, background subtraction provides an effective means of segmenting objects moving in front of a static background. Researchers have ...
Nicholas R. Howe, Alexandra Deschamps
FGCS
2000
104views more  FGCS 2000»
14 years 10 months ago
Protecting secret keys with personal entropy
Conventional encryption technology often requires users to protect a secret key by selecting a password or passphrase. While a good passphrase will only be known to the user, it a...
Carl M. Ellison, Chris Hall, Randy Milbert, Bruce ...
TODS
2002
92views more  TODS 2002»
14 years 10 months ago
Searching in metric spaces with user-defined and approximate distances
Metric access methods (MAMs), such as the M-tree, are powerful index structures for supporting ty queries on metric spaces, which represent a common abstraction for those searchin...
Paolo Ciaccia, Marco Patella
PPPJ
2009
ACM
15 years 5 months ago
Three approaches to object evolution
Dynamic object reclassification allows changes to the type of an object at runtime. This paper makes the case for object evolution, a restriction of general reclassification by ...
Tal Cohen, Joseph Gil