Sciweavers

429 search results - page 82 / 86
» Table extraction using conditional random fields
Sort
View
TCC
2005
Springer
113views Cryptology» more  TCC 2005»
14 years 3 months ago
Entropic Security and the Encryption of High Entropy Messages
Russell and Wang [22] recently introduced an elegant, information-theoretic notion called entropic security of encryption: they required that the cipher text leak no predicate of ...
Yevgeniy Dodis, Adam Smith
BMCBI
2010
110views more  BMCBI 2010»
13 years 10 months ago
TimeDelay-ARACNE: Reverse engineering of gene networks from time-course data by an information theoretic approach
Background: One of main aims of Molecular Biology is the gain of knowledge about how molecular components interact each other and to understand gene function regulations. Using mi...
Pietro Zoppoli, Sandro Morganella, Michele Ceccare...
DAGM
2006
Springer
14 years 1 months ago
Exploiting Low-Level Image Segmentation for Object Recognition
Abstract. A method for exploiting the information in low-level image segmentations for the purpose of object recognition is presented. The key idea is to use a whole ensemble of se...
Volker Roth, Björn Ommer
ACL
2012
12 years 6 days ago
Sentence Dependency Tagging in Online Question Answering Forums
Online forums are becoming a popular resource in the state of the art question answering (QA) systems. Because of its nature as an online community, it contains more updated knowl...
Zhonghua Qu, Yang Liu
ISI
2006
Springer
13 years 9 months ago
An Embedded Bayesian Network Hidden Markov Model for Digital Forensics
In the paper we combine a Bayesian Network model for encoding forensic evidence during a given time interval with a Hidden Markov Model (EBN-HMM) for tracking and predicting the de...
Olivier Y. de Vel, Nianjun Liu, Terry Caelli, Tib&...