Sciweavers

89 search results - page 11 / 18
» Named Entity Recognition: A Maximum Entropy Approach Using G...
Sort
View
IAT
2006
IEEE
14 years 1 months ago
Semantic Labeling of Data by Using the Web
The Web consists of a large amount of unstructured information that hardly can be elaborated by automatic agents. In recent years, a considerable number of techniques for informat...
Leonardo Rigutini, Ernesto Di Iorio, Marco Ernande...
ISCC
2009
IEEE
177views Communications» more  ISCC 2009»
14 years 2 months ago
SECLOUD: Source and Destination Seclusion Using Clouds for wireless ad hoc networks
—The privacy of communicating entities in wireless ad hoc networks is extremely important due to the potential of their being identified and subsequently subjected to attacks (e...
Razvi Doomun, Thaier Hayajneh, Prashant Krishnamur...
DATAMINE
2010
133views more  DATAMINE 2010»
13 years 8 months ago
Using background knowledge to rank itemsets
Assessing the quality of discovered results is an important open problem in data mining. Such assessment is particularly vital when mining itemsets, since commonly many of the disc...
Nikolaj Tatti, Michael Mampaey
IJSI
2008
129views more  IJSI 2008»
13 years 7 months ago
Managing the Acronym/Expansion Identification Process for Text-Mining Applications
This paper deals with an acronym/definition extraction approach from textual data (corpora) and the disambiguation of these definitions (or expansions). Both steps of our global pr...
Mathieu Roche, Violaine Prince
RIAO
2007
13 years 9 months ago
Extracting Useful Information from the Full Text of Fiction
In this paper, we describe some experiments in large-scale Information Extraction (IE) focusing on book texts. We investigate the scalability of IE techniques to full-sized books,...
Sharon Givon, Maria Milosavljevic