Sciweavers

565 search results - page 77 / 113
» A logic for authorization provenance
Sort
View
ADBIS
2006
Springer
135views Database» more  ADBIS 2006»
14 years 19 days ago
Interactive Discovery and Composition of Complex Web Services
Among the most important expected benefits of a global service oriented architecture leveraging web service standards is an increased level of automation in the discovery, composit...
Sergey A. Stupnikov, Leonid A. Kalinichenko, St&ea...
AAAI
2007
13 years 11 months ago
Joint Inference in Information Extraction
The goal of information extraction is to extract database records from text or semi-structured sources. Traditionally, information extraction proceeds by first segmenting each ca...
Hoifung Poon, Pedro Domingos
RSCTC
2010
Springer
178views Fuzzy Logic» more  RSCTC 2010»
13 years 6 months ago
Blind Music Timbre Source Isolation by Multi- resolution Comparison of Spectrum Signatures
Automatic indexing of music instruments for multi-timbre sounds is challenging, especially when partials from different sources are overlapping with each other. Temporal features, ...
Xin Zhang, Wenxin Jiang, Zbigniew W. Ras, Rory A. ...
EUSFLAT
2009
209views Fuzzy Logic» more  EUSFLAT 2009»
13 years 6 months ago
Application of Fuzzy Vectors of Normalized Weights in Decision Making Models
In this paper, the notion of a fuzzy vector of normalized weights is introduced, and its application in decision making models based on the weighted average operation is studied. T...
Ondrej Pavlacka, Jana Talasová
ICDAR
2011
IEEE
12 years 8 months ago
Functional-Based Table Category Identification in Digital Library
– Better understanding the document logical components is crucial to many applications, e.g., document classification or data integration. As the development of digital libraries...
Seongchan Kim, Ying Liu