Sciweavers

15120 search results - page 2759 / 3024
» Learning with Local Models
Sort
View
120
Voted
WWW
2010
ACM
15 years 9 months ago
A scalable machine-learning approach for semi-structured named entity recognition
Named entity recognition studies the problem of locating and classifying parts of free text into a set of predefined categories. Although extensive research has focused on the de...
Utku Irmak, Reiner Kraft
119
Voted
WISEC
2010
ACM
15 years 9 months ago
pBMDS: a behavior-based malware detection system for cellphone devices
Computing environments on cellphones, especially smartphones, are becoming more open and general-purpose, thus they also become attractive targets of malware. Cellphone malware no...
Liang Xie, Xinwen Zhang, Jean-Pierre Seifert, Senc...
134
Voted
KDD
2009
ACM
192views Data Mining» more  KDD 2009»
15 years 9 months ago
Primal sparse Max-margin Markov networks
Max-margin Markov networks (M3 N) have shown great promise in structured prediction and relational learning. Due to the KKT conditions, the M3 N enjoys dual sparsity. However, the...
Jun Zhu, Eric P. Xing, Bo Zhang
140
Voted
CIVR
2009
Springer
212views Image Analysis» more  CIVR 2009»
15 years 9 months ago
NUS-WIDE: a real-world web image database from National University of Singapore
This paper introduces a web image dataset created by NUS’s Lab for Media Search. The dataset includes: (1) 269,648 images and the associated tags from Flickr, with a total of 5,...
Tat-Seng Chua, Jinhui Tang, Richang Hong, Haojie L...
115
Voted
CRYPTO
2009
Springer
122views Cryptology» more  CRYPTO 2009»
15 years 9 months ago
Utility Dependence in Correct and Fair Rational Secret Sharing
The problem of carrying out cryptographic computations when the participating parties are rational in a game-theoretic sense has recently gained much attention. One problem that h...
Gilad Asharov, Yehuda Lindell
« Prev « First page 2759 / 3024 Last » Next »