Sciweavers

150 search results - page 23 / 30
» Attack-resistant frequency counting
Sort
View
LREC
2008
80views Education» more  LREC 2008»
13 years 9 months ago
Turning a Term Extractor into a new Domain: first Experiences
Computational terminology has notably evolved since the advent of computers. Regarding the extraction of terms in particular, a large number of resources has been developed: from ...
Jorge Vivaldi, Anna Joan, Mercè Lorente
ERSA
2006
70views Hardware» more  ERSA 2006»
13 years 9 months ago
Differential Reconfiguration Architecture suitable for a Holographic Memory
Optically Reconfigurable Gate Arrays (ORGAs), by exploiting the large storage capacity of holographic memory, offer the possibility of providing a virtual gate count that is much l...
Minoru Watanabe, Mototsugu Miyano, Fuminori Kobaya...
ACL
2001
13 years 8 months ago
Mapping Lexical Entries in a Verbs Database to WordNet Senses
This paper describes automatic techniques for mapping 9611 entries in a database of English verbs to WordNet senses. The verbs were initially grouped into 491 classes based on syn...
Rebecca Green, Lisa Pearl, Bonnie J. Dorr, Philip ...
SDM
2004
SIAM
194views Data Mining» more  SDM 2004»
13 years 8 months ago
Finding Frequent Patterns in a Large Sparse Graph
Graph-based modeling has emerged as a powerful abstraction capable of capturing in a single and unified framework many of the relational, spatial, topological, and other characteri...
Michihiro Kuramochi, George Karypis
DATAMINE
2006
230views more  DATAMINE 2006»
13 years 7 months ago
Mining top-K frequent itemsets from data streams
Frequent pattern mining on data streams is of interest recently. However, it is not easy for users to determine a proper frequency threshold. It is more reasonable to ask users to ...
Raymond Chi-Wing Wong, Ada Wai-Chee Fu