Sciweavers

5203 search results - page 959 / 1041
» An approach to workflow modeling and analysis
Sort
View
COLING
2008
13 years 10 months ago
Verification and Implementation of Language-Based Deception Indicators in Civil and Criminal Narratives
Our goal is to use natural language processing to identify deceptive and nondeceptive passages in transcribed narratives. We begin by motivating an analysis of language-based dece...
Joan Bachenko, Eileen Fitzpatrick, Michael Schonwe...
COMAD
2008
13 years 10 months ago
Ambiguity: Hide the Presence of Individuals and Their Privacy with Low Information Loss
Publishing a database instance containing individual information poses two kinds of privacy risk: presence leakage, by which the attackers can explicitly identify individuals in (...
Hui Wang
DGO
2007
123views Education» more  DGO 2007»
13 years 10 months ago
Cross-national information policy conflict regarding access to information: building a conceptual framework
This paper addresses cross-national information policy conflict regarding access to information. This type of information policy conflict appears more complex and controversial th...
Lei Zheng
LREC
2010
164views Education» more  LREC 2010»
13 years 10 months ago
Evaluating Machine Translation Utility via Semantic Role Labels
We present the methodology that underlies new metrics for semantic machine translation evaluation that we are developing. Unlike widely-used lexical and n-gram based MT evaluation...
Chi-kiu Lo, Dekai Wu
ICMLA
2008
13 years 10 months ago
Towards On-line Treatment Verification Using cine EPID for Hypofractionated Lung Radiotherapy
We propose a novel approach for on-line treatment verification using cine EPID (Electronic Portal Imaging Device) images for hypofractionated lung radiotherapy based on a machine ...
Xiaoli Tang, Tong Lin, Steve B. Jiang