Sciweavers

342 search results - page 58 / 69
» Learning to tag
Sort
View
CRYPTO
2005
Springer
149views Cryptology» more  CRYPTO 2005»
14 years 1 months ago
Authenticating Pervasive Devices with Human Protocols
Forgery and counterfeiting are emerging as serious security risks in low-cost pervasive computing devices. These devices lack the computational, storage, power, and communication r...
Ari Juels, Stephen A. Weis
ADL
2000
Springer
291views Digital Library» more  ADL 2000»
14 years 11 hour ago
Electronic Books in Digital Libraries
1 Electronic book is an application with a multimedia database of instructional resources, which include hyperlinked text, instructor’s audio/video clips, slides, animation, stil...
Gultekin Özsoyoglu, Nevzat Hurkan Balkir, Gra...
AAAI
2008
13 years 10 months ago
Hidden Dynamic Probabilistic Models for Labeling Sequence Data
We propose a new discriminative framework, namely Hidden Dynamic Conditional Random Fields (HDCRFs), for building probabilistic models which can capture both internal and external...
Xiaofeng Yu, Wai Lam
AAAI
2007
13 years 10 months ago
Template-Independent News Extraction Based on Visual Consistency
Wrapper is a traditional method to extract useful information from Web pages. Most previous works rely on the similarity between HTML tag trees and induced template-dependent wrap...
Shuyi Zheng, Ruihua Song, Ji-Rong Wen
ER
2008
Springer
179views Database» more  ER 2008»
13 years 9 months ago
Recommendation Based Process Modeling Support: Method and User Experience
Abstract Although most workflow management systems nowadays offer graphical editors for process modeling, the learning curve is still too steep for users who are unexperienced in p...
Thomas Hornung, Agnes Koschmider, Georg Lausen