Sciweavers

503 search results - page 50 / 101
» Authenticity by tagging and typing
Sort
View
ENC
2005
IEEE
14 years 2 months ago
Combining Structural and Textual Contexts for Compressing Semistructured Databases
We describe a compression technique for semistructured documents, called SCMPPM, which combines the Prediction by Partial Matching technique with Structural Contexts Model (SCM) t...
Joaquín Adiego, Pablo de la Fuente, Gonzalo...
ICC
2009
IEEE
159views Communications» more  ICC 2009»
14 years 3 months ago
An Enhanced Multiple-Feedback Algorithm for RFID MAC Protocols
Abstract— This paper introduces two new tree-based anticollision schemes using multiple feedback symbols for uplink tag random access of emerging radio frequency identification (...
You-Chang Ko, Sumit Roy, Choong-Ho Cho, Hyong-Woo ...
POLICY
2001
Springer
14 years 1 months ago
Taxonomy and Description of Policy Combination Methods
To control complicated and decomposable networking functions, such as Diffserv, two or more policies must cooperate. Combining two or more mutually dependent policies for a specifi...
Yasusi Kanada
COLING
2008
13 years 10 months ago
Training Conditional Random Fields Using Incomplete Annotations
We address corpus building situations, where complete annotations to the whole corpus is time consuming and unrealistic. Thus, annotation is done only on crucial part of sentences...
Yuta Tsuboi, Hisashi Kashima, Shinsuke Mori, Hirok...
COLING
2008
13 years 10 months ago
Chinese Dependency Parsing with Large Scale Automatically Constructed Case Structures
This paper proposes an approach using large scale case structures, which are automatically constructed from both a small tagged corpus and a large raw corpus, to improve Chinese d...
Kun Yu, Daisuke Kawahara, Sadao Kurohashi