Sciweavers

138 search results - page 16 / 28
» Generating Referring Expressions with OWL2
Sort
View
CRYPTO
2004
Springer
128views Cryptology» more  CRYPTO 2004»
14 years 1 months ago
Faster Correlation Attack on Bluetooth Keystream Generator E0
We study both distinguishing and key-recovery attacks against E0, the keystream generator used in Bluetooth by means of correlation. First, a powerful computation method of correla...
Yi Lu 0002, Serge Vaudenay
INLG
2010
Springer
13 years 5 months ago
Poly-co: An Unsupervised Co-reference Detection System
We describe our contribution to the Generation Challenge 2010 for the tasks of Named Entity Recognition and coreference detection (GREC-NER). To extract the NE and the referring e...
Eric Charton, Michel Gagnon, Benoît Ozell
COLING
2002
13 years 7 months ago
Varying Cardinality in Metonymic Extensions to Nouns
Meaning shifting phenomena such as metonymy have recently attracted increasing interest of researchers. Though these phenomena have been addressed by plenty of computational metho...
Helmut Horacek
BMCBI
2008
242views more  BMCBI 2008»
13 years 7 months ago
annot8r: GO, EC and KEGG annotation of EST datasets
Background: The expressed sequence tag (EST) methodology is an attractive option for the generation of sequence data for species for which no completely sequenced genome is availa...
Ralf Schmid, Mark L. Blaxter
CVPR
2009
IEEE
14 years 2 months ago
On compositional Image Alignment, with an application to Active Appearance Models
Efficient and accurate fitting of Active Appearance Models (AAM) is a key requirement for many applications. The most efficient fitting algorithm today is Inverse Compositiona...
Brian Amberg, Andrew Blake, Thomas Vetter