Sciweavers

198 search results - page 26 / 40
» Weak Probabilistic Anonymity
Sort
View
ICPR
2008
IEEE
14 years 3 months ago
Top down image segmentation using congealing and graph-cut
This paper develops a weakly supervised algorithm that learns to segment rigid multi-colored objects from a set of training images and key points. The approach uses congealing to ...
Douglas Moore, John Stevens, Scott Lundberg, Bruce...
ICALP
1994
Springer
14 years 1 months ago
Simple Fast Parallel Hashing
A hash table is a representation of a set in a linear size data structure that supports constanttime membership queries. We show how to construct a hash table for any given set of...
Joseph Gil, Yossi Matias
NAACL
2007
13 years 10 months ago
Chinese Named Entity Recognition with Cascaded Hybrid Model
We propose a high-performance cascaded hybrid model for Chinese NER. Firstly, we use Boosting, a standard and theoretically wellfounded machine learning method to combine a set of...
Xiaofeng Yu
ICALP
2011
Springer
13 years 16 days ago
On the Semantics of Markov Automata
Markov automata describe systems in terms of events which may be nondeterministic, may occur probabilistically, or may be subject to time delays. We define a novel notion of weak ...
Yuxin Deng, Matthew Hennessy
WWW
2007
ACM
14 years 9 months ago
Organizing and searching the world wide web of facts -- step two: harnessing the wisdom of the crowds
As part of a large effort to acquire large repositories of facts from unstructured text on the Web, a seed-based framework for textual information extraction allows for weakly sup...
Marius Pasca