Sciweavers

1802 search results - page 336 / 361
» Model-based Theory Combination
Sort
View
134
Voted
SIGIR
2003
ACM
15 years 7 months ago
Table extraction using conditional random fields
The ability to find tables and extract information from them is a necessary component of data mining, question answering, and other information retrieval tasks. Documents often c...
David Pinto, Andrew McCallum, Xing Wei, W. Bruce C...
116
Voted
WPES
2003
ACM
15 years 7 months ago
Anonymous credentials with biometrically-enforced non-transferability
We present a model and protocol for anonymous credentials. Rather than using deterrents to ensure non-transferability, our model uses secure hardware with biometric authentication...
Russell Impagliazzo, Sara Miner More
118
Voted
WSNA
2003
ACM
15 years 7 months ago
Cleaning and querying noisy sensors
Sensor networks have become an important source of data with numerous applications in monitoring various real-life phenomena as well as industrial applications and traffic contro...
Eiman Elnahrawy, Badri Nath
ASM
2003
ASM
15 years 7 months ago
A Framework for Proving Contract-Equipped Classes
r in: Abstract State Machines 2003 — Advances in Theory and Applications, Proc. 10th International Workshop, Taormina, Italy, March 3-7, 2003, eds. Egon Boerger, Angelo Gargantin...
Bertrand Meyer
CICLING
2003
Springer
15 years 7 months ago
Total Lexicalism and GASGrammars: A Direct Way to Semantics
A new sort of generative grammar (Sec2) will be demonstrated which is more radically “lexicalist” than any earlier one (Sec1). It is a modified Unification Categorial Gramma...
Gábor Alberti, Katalin Balogh, Judit Kleibe...