Sciweavers

1421 search results - page 105 / 285
» The First and Second Max-SAT Evaluations
Sort
View
CRYPTO
2008
Springer
163views Cryptology» more  CRYPTO 2008»
13 years 12 months ago
Cryptanalysis of the GOST Hash Function
In this article, we analyze the security of the GOST hash function. The GOST hash function, defined in the Russian standard GOST 34.11-94, is an iterated hash function producing a ...
Florian Mendel, Norbert Pramstaller, Christian Rec...
EMNLP
2007
13 years 11 months ago
Tree Kernel-Based Relation Extraction with Context-Sensitive Structured Parse Tree Information
This paper proposes a tree kernel with contextsensitive structured parse tree information for relation extraction. It resolves two critical problems in previous tree kernels for r...
Guodong Zhou, Min Zhang, Dong-Hong Ji, Qiaoming Zh...
ICAI
2007
13 years 11 months ago
Mining and Dynamic Simulation of Sub-Networks from Large Biomolecular Networks
Biomolecular networks dynamically respond to stimuli and implement cellular function. Understanding these dynamic changes is the key challenge for cell biologists. As biomolecular...
Xiaohua Hu, Fang-Xiang Wu, Michael K. Ng, Bahrad A...
LREC
2008
99views Education» more  LREC 2008»
13 years 11 months ago
Using the Web as a Linguistic Resource to Automatically Correct Lexico-Syntactic Errors
This paper presents an algorithm for correcting language errors typical of second-language learners. We focus on preposition errors, which are very common among second-language le...
Matthieu Hermet, Alain Désilets, Stan Szpak...
TRECVID
2008
13 years 11 months ago
Surveillance Event Detection
We have developed and evaluated three generalized systems for event detection. The first system is a simple brute force search method, where each space-time location in the video ...
Mert Dikmen, Huazhong Ning, Dennis J. Lin, Liangli...