Sciweavers

2435 search results - page 107 / 487
» Intellexer Question Answering
Sort
View
FGCS
2000
104views more  FGCS 2000»
15 years 3 months ago
Protecting secret keys with personal entropy
Conventional encryption technology often requires users to protect a secret key by selecting a password or passphrase. While a good passphrase will only be known to the user, it a...
Carl M. Ellison, Chris Hall, Randy Milbert, Bruce ...
155
Voted
COLING
2002
15 years 3 months ago
Learning Question Classifiers
In order to respond correctly to a free form factual question given a large collection of texts, one needs to understand the question to a level that allows determining some of th...
Xin Li, Dan Roth
GECCO
2007
Springer
157views Optimization» more  GECCO 2007»
15 years 9 months ago
Convergence phases, variance trajectories, and runtime analysis of continuous EDAs
Considering the available body of literature on continuous EDAs, one must state that many important questions are still unanswered, e.g.: How do continuous EDAs really work, and h...
Jörn Grahl, Peter A. N. Bosman, Stefan Minner
169
Voted
AIRS
2010
Springer
15 years 1 months ago
Top-Down and Bottom-Up: A Combined Approach to Slot Filling
The Slot Filling task requires a system to automatically distill information from a large document collection and return answers for a query entity with specified attributes (`slot...
Zheng Chen, Suzanne Tamang, Adam Lee, Xiang Li, Ma...
ALT
2009
Springer
16 years 15 days ago
Average-Case Active Learning with Costs
Abstract. We analyze the expected cost of a greedy active learning algorithm. Our analysis extends previous work to a more general setting in which different queries have differe...
Andrew Guillory, Jeff A. Bilmes