Sciweavers

2163 search results - page 420 / 433
» cases 2004
Sort
View
AAAI
2004
14 years 11 months ago
Interactive Information Extraction with Constrained Conditional Random Fields
Information Extraction methods can be used to automatically "fill-in" database forms from unstructured data such as Web documents or email. State-of-the-art methods have...
Trausti T. Kristjansson, Aron Culotta, Paul A. Vio...
AAAI
2004
14 years 11 months ago
Mixed-Initiative Workflow Composition
CAT's knowledge base contains abstract task or example "abstract flight reservation task," which can be included in a workflow as placeholders. CAT will gest that us...
Marc Spraragen
APBC
2004
122views Bioinformatics» more  APBC 2004»
14 years 11 months ago
Evolution of Relative Synonymous Codon Usage in Human Immunodeficiency Virus Type 1
Mutation in HIV-1 is extremely rapid, a consequence of a low-fidelity viral reverse transcription process. The envelope gene has been shown to accumulate substitutions at a rate o...
Peter L. Meintjes, Allen G. Rodrigo
DAGSTUHL
2004
14 years 11 months ago
An Example for Metamodeling Syntax and Semantics of Two Languages, their Transformation, and a Correctness Criterion
We study a metamodel for the Entity Relationship (ER) and the Relational data model. We do this by describing the syntax of the ER data model by introducing classes for ER schemata...
Martin Gogolla
DBSEC
2004
170views Database» more  DBSEC 2004»
14 years 11 months ago
RBAC/MAC Security Analysis and Design for UML
In software construction, analysis investigates the boundary of a system (scope and requirements), its usage and access, and from a security perspective, who needs access to what ...
Thuong Doan, Steven A. Demurjian, Charles E. Phill...