Sciweavers

4050 search results - page 628 / 810
» Information Extraction from Voicemail
Sort
View
EDBT
2004
ACM
268views Database» more  EDBT 2004»
14 years 9 months ago
DBDC: Density Based Distributed Clustering
Abstract. Clustering has become an increasingly important task in modern application domains such as marketing and purchasing assistance, multimedia, molecular biology as well as m...
Eshref Januzaj, Hans-Peter Kriegel, Martin Pfeifle
TCC
2005
Springer
113views Cryptology» more  TCC 2005»
14 years 2 months ago
Entropic Security and the Encryption of High Entropy Messages
Russell and Wang [22] recently introduced an elegant, information-theoretic notion called entropic security of encryption: they required that the cipher text leak no predicate of ...
Yevgeniy Dodis, Adam Smith
MIR
2003
ACM
178views Multimedia» more  MIR 2003»
14 years 2 months ago
A bootstrapping approach to annotating large image collection
Huge amount of manual efforts are required to annotate large image/video archives with text annotations. Several recent works attempted to automate this task by employing supervis...
HuaMin Feng, Tat-Seng Chua
ESANN
2004
13 years 10 months ago
Neural networks for data mining: constrains and open problems
When we talk about using neural networks for data mining we have in mind the original data mining scope and challenge. How did neural networks meet this challenge? Can we run neura...
Razvan Andonie, Boris Kovalerchuk
COLING
1992
13 years 10 months ago
On The Interpretation Of Natural Language Instructions
In this paper, we dLscuss the approach we take to the interpretation of instructions. Instructions describe actions related to each other and to other goals the agent may have; ou...
Barbara Di Eugenio, Michael White