Results 11  20
of
1,361,885
Partial parsing via finitestate cascades
 Natural Language Engineering
, 1996
"... Finitestate cascades represent an attractive architecture for parsing unrestricted text. Deterministic parsers specified by finitestate cascades are fast and reliable. They can be extended at modest cost to construct parse trees with finite feature structures. Finally, such deterministic parsers d ..."
Abstract

Cited by 339 (4 self)
 Add to MetaCart
Finitestate cascades represent an attractive architecture for parsing unrestricted text. Deterministic parsers specified by finitestate cascades are fast and reliable. They can be extended at modest cost to construct parse trees with finite feature structures. Finally, such deterministic parsers
Simple Constructions of Almost kwise Independent Random Variables
, 1992
"... We present three alternative simple constructions of small probability spaces on n bits for which any k bits are almost independent. The number of bits used to specify a point in the sample space is (2 + o(1))(log log n + k/2 + log k + log 1 ɛ), where ɛ is the statistical difference between the dist ..."
Abstract

Cited by 303 (40 self)
 Add to MetaCart
the distribution induced on any k bit locations and the uniform distribution. This is asymptotically comparable to the construction recently presented by Naor and Naor (our size bound is better as long as ɛ < 1/(k log n)). An additional advantage of our constructions is their simplicity.
The distribution of realized exchange rate volatility,
 Journal of the American Statistical Association
, 2001
"... Using highfrequency data on deutschemark and yen returns against the dollar, we construct modelfree estimates of daily exchange rate volatility and correlation that cover an entire decade. Our estimates, termed realized volatilities and correlations, are not only modelfree, but also approximatel ..."
Abstract

Cited by 331 (29 self)
 Add to MetaCart
Using highfrequency data on deutschemark and yen returns against the dollar, we construct modelfree estimates of daily exchange rate volatility and correlation that cover an entire decade. Our estimates, termed realized volatilities and correlations, are not only modelfree, but also
An Evolutionary Algorithm that Constructs Recurrent Neural Networks
 IEEE TRANSACTIONS ON NEURAL NETWORKS
"... Standard methods for inducing both the structure and weight values of recurrent neural networks fit an assumed class of architectures to every task. This simplification is necessary because the interactions between network structure and function are not well understood. Evolutionary computation, whi ..."
Abstract

Cited by 266 (14 self)
 Add to MetaCart
Standard methods for inducing both the structure and weight values of recurrent neural networks fit an assumed class of architectures to every task. This simplification is necessary because the interactions between network structure and function are not well understood. Evolutionary computation
Constructing Biological Knowledge Bases by Extracting Information from Text Sources
, 1999
"... Recently, there has been much effort in making databases for molecular biology more accessible and interoperable. However, information in text form, such as MEDLINE records, remains a greatly underutilized source of biological information. We have begun a research effort aimed at automatically mappi ..."
Abstract

Cited by 266 (0 self)
 Add to MetaCart
mapping information from text sources into structured representations, such as knowledge bases. Our approach to this task is to use machinelearning methods to induce routines for extracting facts from text. We describe two learning methods that we have applied to this task  a statistical text
Predicting the Cumulative Risk of FalsePositive
"... Background: The cumulative risk of a falsepositive mammogram can be substantial. We studied which variables affect the chance of a falsepositive mammogram and estimated cumulative risks over nine sequential mammograms. Methods: We used medical records of 2227 randomly selected women who were 4 ..."
Abstract
 Add to MetaCart
Background: The cumulative risk of a falsepositive mammogram can be substantial. We studied which variables affect the chance of a falsepositive mammogram and estimated cumulative risks over nine sequential mammograms. Methods: We used medical records of 2227 randomly selected women who were
All That Glisters Is Not Gold: SamplingProcess Uncertainty in DiseaseVector Surveys with False Negative and FalsePositive Detections
"... Background: Vectorborne diseases are major public health concerns worldwide. For many of them, vector control is still key to primary prevention, with control actions planned and evaluated using vector occurrence records. Yet vectors can be difficult to detect, and vector occurrence indices will be ..."
Abstract
 Add to MetaCart
detectionstate siteoccupancy models that accommodate falsenegative and falsepositive detections. Mean (6SE) vectorsearch sensitivity was,0.28360.057. Vectordetection odds increased as bug colonies grew denser, and were lower in houses than in most peridomestic structures, particularly woodpiles. Falsepositive
Feature Subset Selection Using A Genetic Algorithm
, 1997
"... : Practical pattern classification and knowledge discovery problems require selection of a subset of attributes or features (from a much larger set) to represent the patterns to be classified. This is due to the fact that the performance of the classifier (usually induced by some learning algorithm) ..."
Abstract

Cited by 280 (7 self)
 Add to MetaCart
: Practical pattern classification and knowledge discovery problems require selection of a subset of attributes or features (from a much larger set) to represent the patterns to be classified. This is due to the fact that the performance of the classifier (usually induced by some learning algorithm
The price of stability for network design with fair cost allocation
 In Proceedings of the 45th Annual Symposium on Foundations of Computer Science (FOCS
, 2004
"... Abstract. Network design is a fundamental problem for which it is important to understand the effects of strategic behavior. Given a collection of selfinterested agents who want to form a network connecting certain endpoints, the set of stable solutions — the Nash equilibria — may look quite differ ..."
Abstract

Cited by 281 (30 self)
 Add to MetaCart
response dynamics in which users iteratively defect from a starting solution. This establishes that the fair cost allocation protocol is in fact a useful mechanism for inducing strategic behavior to form nearoptimal equilibria. We discuss connections to the class of potential games defined by Monderer and Shapley
MAPS: Multiresolution Adaptive Parameterization of Surfaces
, 1998
"... We construct smooth parameterizations of irregular connectivity triangulations of arbitrary genus 2manifolds. Our algorithm uses hierarchical simplification to efficiently induce a parameterization of the original mesh over a base domain consisting of a small number of triangles. This initial param ..."
Abstract

Cited by 265 (12 self)
 Add to MetaCart
We construct smooth parameterizations of irregular connectivity triangulations of arbitrary genus 2manifolds. Our algorithm uses hierarchical simplification to efficiently induce a parameterization of the original mesh over a base domain consisting of a small number of triangles. This initial
Results 11  20
of
1,361,885