Sciweavers

8381 search results - page 1660 / 1677
» The security of machine learning
Sort
View
NLE
2008
108views more  NLE 2008»
13 years 7 months ago
Using automatically labelled examples to classify rhetorical relations: an assessment
Being able to identify which rhetorical relations (e.g., contrast or explanation) hold between spans of text is important for many natural language processing applications. Using ...
Caroline Sporleder, Alex Lascarides
PAMI
2008
216views more  PAMI 2008»
13 years 7 months ago
Annotating Images by Mining Image Search Results
Although it has been studied for years by the computer vision and machine learning communities, image annotation is still far from practical. In this paper, we propose a novel atte...
Xin-Jing Wang, Lei Zhang 0001, Xirong Li, Wei-Ying...
NAR
2006
142views more  NAR 2006»
13 years 7 months ago
miRNAMap: genomic maps of microRNA genes and their target genes in mammalian genomes
Recent work has demonstrated that microRNAs (miRNAs) are involved in critical biological processes by suppressing the translation of coding genes. This work develops an integrated...
Paul Wei-Che Hsu, Hsien-Da Huang, Sheng-Da Hsu, Li...
PR
2008
228views more  PR 2008»
13 years 7 months ago
Accurate integration of multi-view range images using k-means clustering
3D modelling finds a wide range of applications in industry. However, due to the presence of surface scanning noise, accumulative registration errors, and improper data fusion, re...
Hong Zhou, Yonghuai Liu
SIGIR
2008
ACM
13 years 7 months ago
Multi-document summarization via sentence-level semantic analysis and symmetric matrix factorization
Multi-document summarization aims to create a compressed summary while retaining the main characteristics of the original set of documents. Many approaches use statistics and mach...
Dingding Wang, Tao Li, Shenghuo Zhu, Chris H. Q. D...
« Prev « First page 1660 / 1677 Last » Next »