Sciweavers

3918 search results - page 705 / 784
» Probabilistic model of triangulation
Sort
View
CEAS
2004
Springer
14 years 2 months ago
Extracting social networks and contact information from email and the Web
We present an end-to-end system that extracts a user’s social network and its members’ contact information given the user’s email inbox. The system identifies unique people...
Aron Culotta, Ron Bekkerman, Andrew McCallum
CIVR
2004
Springer
121views Image Analysis» more  CIVR 2004»
14 years 2 months ago
Assessing Scene Structuring in Consumer Videos
Abstract. Scene structuring is a video analysis task for which no common evaluation procedures have been fully adopted. In this paper, we present a methodology to evaluate such tas...
Daniel Gatica-Perez, Napat Triroj, Jean-Marc Odobe...
GECCO
2004
Springer
131views Optimization» more  GECCO 2004»
14 years 2 months ago
PolyEDA: Combining Estimation of Distribution Algorithms and Linear Inequality Constraints
Estimation of distribution algorithms (EDAs) are population-based heuristic search methods that use probabilistic models of good solutions to guide their search. When applied to co...
Jörn Grahl, Franz Rothlauf
IJCNLP
2004
Springer
14 years 2 months ago
Phoneme-Based Transliteration of Foreign Names for OOV Problem
One problem seriously affecting CLIR performance is the processing of queries with embedded foreign names. A proper noun dictionary is never complete rendering name translation fr...
Wei Gao, Kam-Fai Wong, Wai Lam
TCC
2004
Springer
173views Cryptology» more  TCC 2004»
14 years 2 months ago
Soundness of Formal Encryption in the Presence of Active Adversaries
Abstract. We present a general method to prove security properties of cryptographic protocols against active adversaries, when the messages exchanged by the honest parties are arbi...
Daniele Micciancio, Bogdan Warinschi