Sciweavers

3719 search results - page 725 / 744
» order 2010
Sort
View
EMNLP
2010
13 years 7 months ago
Improving Mention Detection Robustness to Noisy Input
Information-extraction (IE) research typically focuses on clean-text inputs. However, an IE engine serving real applications yields many false alarms due to less-well-formed input...
Radu Florian, John F. Pitrelli, Salim Roukos, Imed...
EMNLP
2010
13 years 7 months ago
A New Approach to Lexical Disambiguation of Arabic Text
We describe a model for the lexical analysis of Arabic text, using the lists of alternatives supplied by a broad-coverage morphological analyzer, SAMA, which include stable lemma ...
Rushin Shah, Paramveer S. Dhillon, Mark Liberman, ...
FOCS
2010
IEEE
13 years 7 months ago
The Coin Problem and Pseudorandomness for Branching Programs
The Coin Problem is the following problem: a coin is given, which lands on head with probability either 1/2 + or 1/2 - . We are given the outcome of n independent tosses of this co...
Joshua Brody, Elad Verbin
GI
2010
Springer
13 years 7 months ago
Open Innovation Marketing. A Case Study
: Social networks and communities like facebook and myspace gain increasing importance in people's everyday lives. Companies start to see these platforms as a chance for commu...
Catharina van Delden, Nancy Wünderlich
GLOBECOM
2010
IEEE
13 years 7 months ago
Performance Analysis of Dynamic Spectrum Access Networks under Primary User Emulation Attacks
Primary user emulation attack (PUEA) is a denial of service (DoS) attack unique to dynamic spectrum access (DSA) networks. While there have been studies in the literature to detect...
Z. Jin, S. Anand, K. P. Subbalakshmi