Sciweavers

2678 search results - page 153 / 536
» Comparative Evaluation of Approaches to Propositionalization
Sort
View
ACL
2012
11 years 10 months ago
A Broad-Coverage Normalization System for Social Media Language
Social media language contains huge amount and wide variety of nonstandard tokens, created both intentionally and unintentionally by the users. It is of crucial importance to norm...
Fei Liu, Fuliang Weng, Xiao Jiang
CORR
2010
Springer
286views Education» more  CORR 2010»
13 years 5 months ago
PhishDef: URL Names Say It All
Phishing is an increasingly sophisticated method to steal personal user information using sites that pretend to be legitimate. In this paper, we take the following steps to identif...
Anh Le, Athina Markopoulou, Michalis Faloutsos
COLING
2010
13 years 3 months ago
Discriminative Induction of Sub-Tree Alignment using Limited Labeled Data
We employ Maximum Entropy model to conduct sub-tree alignment between bilingual phrasal structure trees. Various lexical and structural knowledge is explored to measure the syntac...
Jun Sun, Min Zhang, Chew Lim Tan
TASLP
2011
13 years 3 months ago
Scale Transform in Rhythmic Similarity of Music
— As a special case of the Mellin transform, the scale transform has been applied in various signal processing areas, in order to get a signal description that is invariant to sc...
Andre Holzapfel, Yannis Stylianou
JIRS
2010
153views more  JIRS 2010»
13 years 3 months ago
Flyphone: Visual Self-Localisation Using a Mobile Phone as Onboard Image Processor on a Quadrocopter
An unmanned aerial vehicle (UAV) needs to orient itself in its operating environment to fly autonomously. Localisation methods based on visual data are independent of erroneous GPS...
Sara Erhard, Karl Engelbert Wenzel, Andreas Zell