Sciweavers

700 search results - page 71 / 140
» words 2005
Sort
View
SPIRE
2005
Springer
15 years 3 months ago
Deriving TF-IDF as a Fisher Kernel
The Dirichlet compound multinomial (DCM) distribution has recently been shown to be a good model for documents because it captures the phenomenon of word burstiness, unlike standar...
Charles Elkan
TCC
2005
Springer
132views Cryptology» more  TCC 2005»
15 years 3 months ago
Evaluating 2-DNF Formulas on Ciphertexts
Let ψ be a 2-DNF formula on boolean variables x1, . . . , xn ∈ {0, 1}. We present a homomorphic public key encryption scheme that allows the public evaluation of ψ given an en...
Dan Boneh, Eu-Jin Goh, Kobbi Nissim
TSD
2005
Springer
15 years 3 months ago
Automatic Acquisition of a Slovak Lexicon from a Raw Corpus
This paper presents an automatic methodology we used in an experiment to acquire a morphological lexicon for the Slovak language, and the lexicon we obtained. This methodology exte...
Benoît Sagot
WEBI
2005
Springer
15 years 3 months ago
Network-Based Intrusion Detection Using Adaboost Algorithm
Intrusion detection on the internet is a heated research field in computer science, where much work has been done during the past two decades. In this paper, we build a network-b...
Wei Hu, Weiming Hu
CICLING
2005
Springer
14 years 11 months ago
Lexicalized Beam Thresholding Parsing with Prior and Boundary Estimates
We use prior and boundary estimates as the approximation of outside probability and establish our beam thresholding strategies based on these estimates. Lexical items, e.g. head wo...
Deyi Xiong, Qun Liu, Shouxun Lin