Sciweavers

2399 search results - page 346 / 480
» Avatar Information Extraction System
Sort
View
TSE
2008
128views more  TSE 2008»
15 years 4 months ago
Analyzing Regulatory Rules for Privacy and Security Requirements
Information practices that use personal, financial, and health-related information are governed by US laws and regulations to prevent unauthorized use and disclosure. To ensure com...
Travis D. Breaux, Annie I. Antón
JSS
2002
84views more  JSS 2002»
15 years 4 months ago
The impact of component architectures on interoperability
Component interoperability has become an important concern as companies migrate legacy systems, integrate COTS products, and assemble modules from disparate sources into a single ...
Leigh A. Davis, Rose F. Gamble, Jamie Payton
139
Voted
NAACL
2010
15 years 2 months ago
Learning to Link Entities with Knowledge Base
This paper address the problem of entity linking. Specifically, given an entity mentioned in unstructured texts, the task is to link this entity with an entry stored in the existi...
Zhicheng Zheng, Fangtao Li, Minlie Huang, Xiaoyan ...
125
Voted
WEBI
2010
Springer
15 years 2 months ago
On Using Query Logs for Static Index Pruning
Static index pruning techniques aim at removing from the posting lists of an inverted file the references to documents which are likely to be not relevant for answering user querie...
Hoang Thanh Lam, Raffaele Perego, Fabrizio Silvest...
129
Voted
ACL
2009
15 years 2 months ago
Answering Opinion Questions with Random Walks on Graphs
Opinion Question Answering (Opinion QA), which aims to find the authors' sentimental opinions on a specific target, is more challenging than traditional factbased question an...
Fangtao Li, Yang Tang, Minlie Huang, Xiaoyan Zhu