Sciweavers

435 search results - page 75 / 87
» Web Facts and Fantasy
Sort
View
ACL
2011
12 years 11 months ago
Knowledge-Based Weak Supervision for Information Extraction of Overlapping Relations
Information extraction (IE) holds the promise of generating a large-scale knowledge base from the Web’s natural language text. Knowledge-based weak supervision, using structured...
Raphael Hoffmann, Congle Zhang, Xiao Ling, Luke S....
CHI
2009
ACM
14 years 8 months ago
The doctor as the second opinion and the internet as the first
People who use the Internet for health information often obtain their first opinion that way, and then, if they go to a doctor, the doctors advice is relegated to the second opini...
Lisa Neal Gualtieri
WSDM
2010
ACM
322views Data Mining» more  WSDM 2010»
14 years 4 months ago
Inferring Search Behaviors Using Partially Observable Markov (POM) Model
This article describes an application of the partially observable Markov (POM) model to the analysis of a large scale commercial web search log. Mathematically, POM is a variant o...
Kuansan Wang, Nikolas Gloy, Xiaolong Li
ICDE
2009
IEEE
195views Database» more  ICDE 2009»
14 years 2 months ago
The PRISM Workwench: Database Schema Evolution without Tears
— Information Systems are subject to a perpetual evolution, which is particularly pressing in Web Information Systems, due to their distributed and often collaborative nature. Su...
Carlo Curino, Hyun J. Moon, MyungWon Ham, Carlo Za...
RV
2007
Springer
151views Hardware» more  RV 2007»
14 years 1 months ago
Instrumentation of Open-Source Software for Intrusion Detection
A significant number of cyber assaults are attempted against open source internet support software written in C, C++, or Java. Examples of these software packages include the Apac...
William R. Mahoney, William L. Sousan