Sciweavers

2200 search results - page 253 / 440
» An Entity-Level Approach to Information Extraction
Sort
View
COMAD
2008
13 years 9 months ago
An Incremental Summary Generation System
Huge amount of information is present in the World Wide Web and a large amount is being added to it frequently. A query-specific summary of multiple documents is very helpful to t...
C. Ravindranath Chowdary, P. Sreenivasa Kumar
BMCBI
2005
93views more  BMCBI 2005»
13 years 8 months ago
Identification of novel prognostic markers in cervical intraepithelial neoplasia using LDMAS (LOH Data Management and Analysis S
Background: Detection of Loss of Heterozygosity (LOH) is one of the most common molecular applications in the study of human diseases, in particular cancer. The technique is commo...
Rifat A. Hamoudi, Amina El-Hamidi, Ming-Qing Du
DOCENG
2004
ACM
14 years 1 months ago
Creation of topic map by identifying topic chain in chinese
XML Topic maps enable multiple, concurrent views of sets of information objects and can be used to different applications. For example, thesaurus-like interfaces to corpora, navig...
Ching-Long Yeh, Yi-Chun Chen
SP
2008
IEEE
133views Security Privacy» more  SP 2008»
14 years 2 months ago
ClearShot: Eavesdropping on Keyboard Input from Video
Eavesdropping on electronic communication is usually prevented by using cryptography-based mechanisms. However, these mechanisms do not prevent one from obtaining private informat...
Davide Balzarotti, Marco Cova, Giovanni Vigna
ECBS
2004
IEEE
129views Hardware» more  ECBS 2004»
13 years 11 months ago
Using Feature Modeling for Program Comprehension and Software Architecture Recovery
: The available evidence in a legacy software system, which can help in its understanding and recovery of its architecture are not always sufficient. Very often the system's d...
Ilian Pashov, Matthias Riebisch