Sciweavers

2259 search results - page 104 / 452
» Separation and information hiding
Sort
View
CIKM
2011
Springer
12 years 9 months ago
Joint inference for cross-document information extraction
Previous information extraction (IE) systems are typically organized as a pipeline architecture of separated stages which make independent local decisions. When the data grows bey...
Qi Li, Sam Anzaroot, Wen-Pin Lin, Xiang Li, Heng J...
CI
2004
76views more  CI 2004»
13 years 8 months ago
Negotiating Exchanges of P3p-Labeled Information for Compensation
We consider private information a commodity, of value to both the information holder and the information seeker. Hence, a customer can be enticed to trade his/her private informati...
Scott Buffett, Keping Jia, Sandy Liu, Bruce Spence...
WWW
2005
ACM
14 years 9 months ago
An architecture for personal semantic web information retrieval system
The semantic Web and Web service technologies have provided both new possibilities and challenges to automatic information processing. There are a lot of researches on applying th...
Haibo Yu, Tsunenori Mine, Makoto Amamiya
WABI
2007
Springer
109views Bioinformatics» more  WABI 2007»
14 years 3 months ago
Two Birds, One Stone: Selecting Functionally Informative Tag SNPs for Disease Association Studies
Selecting an informative subset of SNPs, generally referred to as tag SNPs, to genotype and analyze is considered to be an essential step toward effective disease association studi...
Phil Hyoun Lee, Hagit Shatkay
IWIA
2006
IEEE
14 years 3 months ago
An Application of Information Theory to Intrusion Detection
Zero-day attacks, new (anomalous) attacks exploiting previously unknown system vulnerabilities, are a serious threat. Defending against them is no easy task, however. Having ident...
E. Earl Eiland, Lorie M. Liebrock