Sciweavers

1272 search results - page 243 / 255
» Structured queries in XML retrieval
Sort
View
DEXAW
2007
IEEE
138views Database» more  DEXAW 2007»
14 years 2 months ago
Machine Learning for Question Answering from Tabular Data
Question Answering (QA) systems automatically answer natural language questions in a human-like manner. One of the practical approaches to open domain QA consists in extracting fa...
Mahboob Alam Khalid, Valentin Jijkoun, Maarten de ...
SEMCO
2007
IEEE
14 years 2 months ago
Sub-Symbolic Semantic Layer in Cyc for Intuitive Chat-Bots
The work presented in this paper aims to combine Latent Semantic Analysis methodology, common sense and traditional knowledge representation in order to improve the dialogue capab...
Giovanni Pilato, Agnese Augello, Giorgio Vassallo,...
ACSC
2006
IEEE
14 years 1 months ago
Improvements of TLAESA nearest neighbour search algorithm and extension to approximation search
Nearest neighbour (NN) searches and k nearest neighbour (k-NN) searches are widely used in pattern recognition and image retrieval. An NN (k-NN) search finds the closest object (...
Ken Tokoro, Kazuaki Yamaguchi, Sumio Masuda
WOWMOM
2005
ACM
240views Multimedia» more  WOWMOM 2005»
14 years 1 months ago
An Adaptive Routing Protocol for Ad Hoc Peer-to-Peer Networks
Ad hoc networks represent a key factor in the evolution of wireless communications. These networks typically consist of equal nodes that communicate without central control, inter...
Luca Gatani, Giuseppe Lo Re, Salvatore Gaglio
EDO
2005
Springer
14 years 1 months ago
Using parse tree validation to prevent SQL injection attacks
An SQL injection attack targets interactive web applications that employ database services. Such applications accept user input, such as form fields, and then include this input ...
Gregory Buehrer, Bruce W. Weide, Paolo A. G. Sivil...