Sciweavers

8614 search results - page 1620 / 1723
» Mining
Sort
View
ACL
2012
11 years 10 months ago
Learning to "Read Between the Lines" using Bayesian Logic Programs
Most information extraction (IE) systems identify facts that are explicitly stated in text. However, in natural language, some facts are implicit, and identifying them requires â€...
Sindhu Raghavan, Raymond J. Mooney, Hyeonseo Ku
SPIN
2012
Springer
11 years 10 months ago
Counterexample Explanation by Anomaly Detection
Since counterexamples generated by model checking tools are only symptoms of faults in the model, a signiïŹcant amount of manual work is required in order to locate the fault that...
Stefan Leue, Mitra Tabaei Befrouei
TKDE
2012
227views Formal Methods» more  TKDE 2012»
11 years 10 months ago
Publishing Search Logs - A Comparative Study of Privacy Guarantees
—Search engine companies collect the “database of intentions”, the histories of their users’ search queries. These search logs are a gold mine for researchers. Search engin...
Michaela Götz, Ashwin Machanavajjhala, Guozha...
AAAI
2012
11 years 10 months ago
A Spin-Glass Model for Semi-Supervised Community Detection
Current modularity-based community detection methods show decreased performance as relational networks become increasingly noisy. These methods also yield a large number of divers...
Eric Eaton, Rachael Mansbach
ICSE
2012
IEEE-ACM
11 years 10 months ago
Synthesizing API usage examples
Abstract—Key program interfaces are sometimes documented with usage examples: concrete code snippets that characterize common use cases for a particular data type. While such doc...
Raymond P. L. Buse, Westley Weimer
« Prev « First page 1620 / 1723 Last » Next »