Sciweavers

2621 search results - page 471 / 525
» Generalized Algorithms for Constructing Statistical Language...
Sort
View
COMAD
2008
13 years 9 months ago
Ambiguity: Hide the Presence of Individuals and Their Privacy with Low Information Loss
Publishing a database instance containing individual information poses two kinds of privacy risk: presence leakage, by which the attackers can explicitly identify individuals in (...
Hui Wang
UAI
2003
13 years 9 months ago
Updating with incomplete observations
Currently, there is renewed interest in the problem, raised by Shafer in 1985, of updating probabilities when observations are incomplete (or setvalued). This is a fundamental pro...
Gert de Cooman, Marco Zaffalon
JCDL
2011
ACM
191views Education» more  JCDL 2011»
12 years 10 months ago
Serendipitous recommendation for scholarly papers considering relations among researchers
Serendipity occurs when one finds an interesting discovery while searching for something else. In digital libraries, recommendation engines are particularly well-suited for seren...
Kazunari Sugiyama, Min-Yen Kan
JCDL
2003
ACM
119views Education» more  JCDL 2003»
14 years 29 days ago
Genescene: Biomedical Text And Data Mining
To access the content of digital texts efficiently, it is necessary to provide more sophisticated access than keyword based searching. Genescene provides biomedical researchers wi...
Gondy Leroy, Hsinchun Chen, Jesse D. Martinez, Sha...
CIKM
2008
Springer
13 years 9 months ago
Integrating clustering and multi-document summarization to improve document understanding
Document understanding techniques such as document clustering and multi-document summarization have been receiving much attention in recent years. Current document clustering meth...
Dingding Wang, Shenghuo Zhu, Tao Li, Yun Chi, Yiho...