Sciweavers

3674 search results - page 181 / 735
» Information Dependencies
Sort
View
COLING
2000
13 years 11 months ago
Japanese Named Entity Extraction Evaluation - Analysis of Results
We will report on one of the two tasks in the IREX (Information Retrieval and Extraction Exercise) project, an evaluation-based project for Information Retrieval and Information E...
Satoshi Sekine, Yoshio Eriguchi
CSREASAM
2006
13 years 11 months ago
Reinforcing Access Control Using Fuzzy Relation Equations
Current computer security systems are based on the premise that once a user presents valid credentials to the authentication system (e.g. valid ID and password), they are granted ...
Ali Berrached, André de Korvin
CIKM
2008
Springer
14 years 7 days ago
Academic conference homepage understanding using constrained hierarchical conditional random fields
We address the problem of academic conference homepage understanding for the Semantic Web. This problem consists of three labeling tasks - labeling conference function pages, func...
Xin Xin, Juanzi Li, Jie Tang, Qiong Luo
DSRT
1999
IEEE
14 years 2 months ago
Resolving Concurrent Interactions
Serialization, the traditional method of resolving concurrent interactions, is often inappropriate; when interactions are dependent on each other, other policies for resolving the...
Anand Natrajan, Paul F. Reynolds Jr.
CHIMIT
2007
ACM
14 years 2 months ago
Design guidelines for system administration tools developed through ethnographic field studies
Information Technology system administrators (sysadmins) perform the crucial and never-ending work of maintaining the technical infrastructure on which our society depends. Comput...
Eben M. Haber, John H. Bailey