Sciweavers

CORR
2007
Springer
119views Education» more  CORR 2007»
13 years 7 months ago
Using Description Logics for Recognising Textual Entailment
The aim of this paper is to show how we can handle the Recognising Textual Entailment (RTE) task by using Description Logics (DLs). To do this, we propose a representation of natur...
Paul Bedaride
CORR
2007
Springer
88views Education» more  CORR 2007»
13 years 7 months ago
A generic attack to ciphers
In this paper, we present a generic attack for ciphers, which is in essence a collision attack on the secret keys of ciphers .
An-Ping Li
CORR
2007
Springer
64views Education» more  CORR 2007»
13 years 7 months ago
Generating models for temporal representations
We discuss the use of model building for temporal representations. We chose Polish to illustrate our discussion because it has an interesting aspectual system, but the points we w...
Patrick Blackburn, Sébastien Hinderer
CORR
2007
Springer
109views Education» more  CORR 2007»
13 years 7 months ago
Consistency of trace norm minimization
Regularization by the sum of singular values, also referred to as the trace norm, is a popular technique for estimating low rank rectangular matrices. In this paper, we extend som...
Francis Bach
CORR
2007
Springer
138views Education» more  CORR 2007»
13 years 7 months ago
Capacity of Linear Two-hop Mesh Networks with Rate Splitting, Decode-and-forward Relaying and Cooperation
— A linear mesh network is considered in which a single user per cell communicates to a local base station via a dedicated relay (two-hop communication). Exploiting the possibly ...
Osvaldo Simeone, Oren Somekh, Yeheskel Bar-Ness, H...
CORR
2007
Springer
170views Education» more  CORR 2007»
13 years 7 months ago
The structure of verbal sequences analyzed with unsupervised learning techniques
Data mining allows the exploration of sequences of phenomena, whereas one usually tends to focus on isolated phenomena or on the relation between two phenomena. It offers invaluab...
Catherine Recanati, Nicoleta Rogovschi, Youn&egrav...
CORR
2007
Springer
135views Education» more  CORR 2007»
13 years 7 months ago
Association Rules in the Relational Calculus
One of the most utilized data mining tasks is the search for association rules. Association rules represent significant relationships between items in transactions. We extend the...
Oliver Schulte, Flavia Moser, Martin Ester, Zhiyon...
CORR
2007
Springer
97views Education» more  CORR 2007»
13 years 7 months ago
Solving Infinite Kolam in Knot Theory
Yukitaka Ishimoto
CORR
2007
Springer
72views Education» more  CORR 2007»
13 years 7 months ago
A Heuristic Routing Mechanism Using a New Addressing Scheme
Current methods of routing are based on network information in the form of routing tables, in which routing protocols determine how to update the tables according to the network ch...
Mohsen Ravanbakhsh, Yasin Abbasi-Yadkori, Maghsoud...
CORR
2007
Springer
61views Education» more  CORR 2007»
13 years 7 months ago
The Secrecy Capacity of the MIMO Wiretap Channel
Frédérique E. Oggier, Babak Hassibi