Sciweavers

952 search results - page 100 / 191
» TreeFam: 2008 Update
Sort
View
COMAD
2008
15 years 5 months ago
The Efficient Maintenance of Access Roles with Role Hiding
Role-based access control (RBAC) has attracted considerable research interest. However, the computational issues of RBAC models are yet to be thoroughly studied. In this paper, we...
Chaoyi Pang, Xiuzhen Zhang, Yanchun Zhang, Kotagir...
DMIN
2008
241views Data Mining» more  DMIN 2008»
15 years 5 months ago
Leakage Detection by Adaptive Process Modeling
Abstract-- In this paper, we propose an adaptive linear approach for time series modeling and steam line leakage detection. Weighted recursive least squares (WRLS) method is used f...
Jaakko Talonen, Miki Sirola, Jukka Parviainen
EMNLP
2008
15 years 5 months ago
Online Acquisition of Japanese Unknown Morphemes using Morphological Constraints
We propose a novel lexicon acquirer that works in concert with the morphological analyzer and has the ability to run in online mode. Every time a sentence is analyzed, it detects ...
Yugo Murawaki, Sadao Kurohashi
LREC
2008
95views Education» more  LREC 2008»
15 years 5 months ago
Using Similarity Measures to Extend the LinGO Lexicon
Deep processing of natural language requires large scale lexical resources that have sufficient coverage at a sufficient level of detail and accuracy (i.e. both recall and precisi...
Lynne J. Cahill
LREC
2008
170views Education» more  LREC 2008»
15 years 5 months ago
A Semantic Memory for Incremental Ontology Population
Generally, ontology learning and population is applied as a semi-automatic approach to knowledge acquisition in natural language understanding systems. That means, after the ontol...
Berenike Loos, Lasse Schwarten