Sciweavers

15351 search results - page 165 / 3071
» The information bottleneck method
Sort
View
AIRS
2008
Springer
14 years 3 months ago
Study of Kernel-Based Methods for Chinese Relation Extraction
Abstract. In this paper, we mainly explore the effectiveness of two kernelbased methods, the convolution tree kernel and the shortest path dependency kernel, for Chinese relation e...
Ruihong Huang, Le Sun, Yuanyong Feng
FBIT
2007
IEEE
14 years 3 months ago
Simulating Biological Pathways with a Continuous Petri Net Using Runge-Kutta Methods
The application of Petri nets to analyze and simulate biological pathways has been developed vigorously. Some of the modifications of Petri nets appeared to perform quantitative a...
Sunku Kang, Byungwoo Lee, Jihoon Yang, Seonho Kim,...
ICDIM
2007
IEEE
14 years 3 months ago
An access control video watermarking method that is robust to geometric distortions
: A new video watermarking algorithm for access control is introduced. This method is content-dependent and uses the dual tree complex wavelet transform (DT CWT) to create a waterm...
Lino Coria-Mendoza, Panos Nasiopoulos, Rabab Kreid...
EKAW
2004
Springer
14 years 2 months ago
Refactoring Methods for Knowledge Bases
The manual development of large knowledge systems is a difficult and error-prone task. In order to facilitate extensions to an existing knowledge base the structural design of the...
Joachim Baumeister, Frank Puppe, Dietmar Seipel
MMMACNS
2001
Springer
14 years 1 months ago
Open Issues in Formal Methods for Cryptographic Protocol Analysis
The history of the application of formal methods to cryptographic protocol analysis spans nearly twenty years, and recently has been showing signs of new maturity and consolidatio...
Catherine Meadows