Sciweavers

723 search results - page 108 / 145
» Learning a Hidden Subgraph
Sort
View
HAIS
2009
Springer
14 years 1 months ago
Multiobjective Evolutionary Clustering Approach to Security Vulnerability Assesments
Network vulnerability assessments collect large amounts of data to be further analyzed by security experts. Data mining and, particularly, unsupervised learning can help experts an...
Guiomar Corral, A. Garcia-Piquer, Albert Orriols-P...
VLDB
1997
ACM
169views Database» more  VLDB 1997»
14 years 1 months ago
Mining Insurance Data at Swiss Life
Huge masses of digital data about products, customers and competitors have become available for companies in the services sector. In order to exploit its inherent (and often hidde...
Jörg-Uwe Kietz, Ulrich Reimer, Martin Staudt
ACL
2007
13 years 10 months ago
Conditional Modality Fusion for Coreference Resolution
Non-verbal modalities such as gesture can improve processing of spontaneous spoken language. For example, similar hand gestures tend to predict semantic similarity, so features th...
Jacob Eisenstein, Randall Davis
COLING
2008
13 years 10 months ago
Weakly Supervised Supertagging with Grammar-Informed Initialization
Much previous work has investigated weak supervision with HMMs and tag dictionaries for part-of-speech tagging, but there have been no similar investigations for the harder proble...
Jason Baldridge
EMNLP
2007
13 years 10 months ago
What is the Jeopardy Model? A Quasi-Synchronous Grammar for QA
This paper presents a syntax-driven approach to question answering, specifically the answer-sentence selection problem for short-answer questions. Rather than using syntactic fea...
Mengqiu Wang, Noah A. Smith, Teruko Mitamura