Sciweavers

852 search results - page 159 / 171
» Knowledge Base Population: Successful Approaches and Challen...
Sort
View
SIGMOD
2009
ACM
269views Database» more  SIGMOD 2009»
14 years 7 months ago
Efficient approximate entity extraction with edit distance constraints
Named entity recognition aims at extracting named entities from unstructured text. A recent trend of named entity recognition is finding approximate matches in the text with respe...
Wei Wang 0011, Chuan Xiao, Xuemin Lin, Chengqi Zha...
MOBISYS
2008
ACM
14 years 6 months ago
Virtual trip lines for distributed privacy-preserving traffic monitoring
Automotive traffic monitoring using probe vehicles with Global Positioning System receivers promises significant improvements in cost, coverage, and accuracy. Current approaches, ...
Baik Hoh, Marco Gruteser, Ryan Herring, Jeff Ban, ...
DIM
2006
ACM
14 years 21 days ago
Privacy preserving multi-factor authentication with biometrics
An emerging approach to the problem of reducing the identity theft is represented by the adoption of biometric authentication systems. Such systems however present however several...
Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciari...
BMCBI
2008
135views more  BMCBI 2008»
13 years 6 months ago
Functional site prediction selects correct protein models
Background: The prediction of protein structure can be facilitated by the use of constraints based on a knowledge of functional sites. Without this information it is still possibl...
Vijayalakshmi Chelliah, William R. Taylor
ECCV
2002
Springer
14 years 8 months ago
Learning Shape from Defocus
We present a novel method for inferring three-dimensional shape from a collection of defocused images. It is based on the observation that defocused images are the null-space of ce...
Paolo Favaro, Stefano Soatto