Sciweavers

5647 search results - page 66 / 1130
» A word from the editor
Sort
View
CLIN
2003
13 years 10 months ago
Methods for the Extraction of Hungarian Multi-Word Lexemes
This paper describes an experiment on extracting Hungarian multi-word lexemes from a corpus, using statistical methods. Corpus preparation—the addition of POS tags and stems—w...
Balázs Kis, Begoña Villada, Gosse Bo...
IJBRA
2006
61views more  IJBRA 2006»
13 years 9 months ago
Finding functional promoter motifs by computational methods: a word of caution
: The standard practice in the analysis of promoters is to select promoter regions of convenient length. This may lead to false results when searching for Transcription Factor Bind...
Rajesh Chowdhary, Limsoon Wong, Vladimir B. Bajic
TROB
2008
136views more  TROB 2008»
13 years 8 months ago
Fast and Incremental Method for Loop-Closure Detection Using Bags of Visual Words
Abstract--In robotic applications of visual simultaneous localization and mapping techniques, loop-closure detection and global localization are two issues that require the capacit...
Adrien Angeli, David Filliat, Stéphane Donc...
ACL
2010
13 years 7 months ago
Open-Domain Semantic Role Labeling by Modeling Word Spans
Most supervised language processing systems show a significant drop-off in performance when they are tested on text that comes from a domain significantly different from the domai...
Fei Huang, Alexander Yates
IACR
2011
116views more  IACR 2011»
12 years 8 months ago
Some Words About Cryptographic Key Recognition In Data Streams
Search for cryptographic keys in RAM is a new and prospective technology which can be used, primarily, in the computer forensics. In order to use it, a cryptanalyst must solve, at...
Alexey Chilikov, Evgeny Alekseev