Sciweavers

4050 search results - page 612 / 810
» Information Extraction from Voicemail
Sort
View
ERSHOV
2003
Springer
14 years 2 months ago
On the Possibility of Provably Secure Obfuscating Programs
By obfuscation we mean any efficient semantic-preserving transformation of computer programs aimed at bringing a program into such a form, which impedes the understanding of its al...
Nikolay P. Varnovsky, Vladimir A. Zakharov
FPL
2003
Springer
259views Hardware» more  FPL 2003»
14 years 2 months ago
Branch Optimisation Techniques for Hardware Compilation
Abstract. This paper explores using information about program branch probabilities to optimise reconfigurable designs. The basic premise is to promote utilization by dedicating mo...
Henry Styles, Wayne Luk
JCDL
2010
ACM
259views Education» more  JCDL 2010»
14 years 2 months ago
Exploiting time-based synonyms in searching document archives
Query expansion of named entities can be employed in order to increase the retrieval effectiveness. A peculiarity of named entities compared to other vocabulary terms is that they...
Nattiya Kanhabua, Kjetil Nørvåg
NLPRS
2001
Springer
14 years 2 months ago
Named Entity Recognition using Machine Learning Methods and Pattern-Selection Rules
Named Entity recognition, as a task of providing important semantic information, is a critical first step in Information Extraction and QuestionAnswering system. This paper propos...
Choong-Nyoung Seon, Youngjoong Ko, Jeong-Seok Kim,...
INFOVIS
2000
IEEE
14 years 2 months ago
Visualizing Sequential Patterns for Text Mining
A sequential pattern in data mining is a finite series of elements such as A → B → C → D where A, B, C, and D are elements of the same domain. The mining of sequential patte...
Pak Chung Wong, Wendy Cowley, Harlan Foote, Elizab...