Results 1 - 10
of
43,350
Traditional Event Extraction mainly focuses
"... on event type identification and event partici-pants extraction based on pre-specified event type annotations. However, different domains have different event type paradigms. When transferring to a new domain, we have to build a new event type paradigm. It is a costly task to discover and annotate e ..."
Abstract
- Add to MetaCart
on event type identification and event partici-pants extraction based on pre-specified event type annotations. However, different domains have different event type paradigms. When transferring to a new domain, we have to build a new event type paradigm. It is a costly task to discover and annotate event types manually. To address this problem, this paper proposes a novel approach of building an event type para-digm by clustering event triggers. Based on the trigger clusters, the event type paradigm can be built automatically. Experimental re-sults on three different corpora – ACE (small, homogeneous, open corpus), Financial News and Musical News (large scale, specific do-
Missing data: Our view of the state of the art
- Psychological Methods
, 2002
"... Statistical procedures for missing data have vastly improved, yet misconception and unsound practice still abound. The authors frame the missing-data problem, review methods, offer advice, and raise issues that remain unresolved. They clear up common misunderstandings regarding the missing at random ..."
Abstract
-
Cited by 739 (1 self)
- Add to MetaCart
most data analysis proce-dures were not designed for them. Missingness is usu-ally a nuisance, not the main focus of inquiry, but
A review of image denoising algorithms, with a new one
- SIMUL
, 2005
"... The search for efficient image denoising methods is still a valid challenge at the crossing of functional analysis and statistics. In spite of the sophistication of the recently proposed methods, most algorithms have not yet attained a desirable level of applicability. All show an outstanding perf ..."
Abstract
-
Cited by 508 (6 self)
- Add to MetaCart
performance when the image model corresponds to the algorithm assumptions but fail in general and create artifacts or remove image fine structures. The main focus of this paper is, first, to define a general mathematical and experimental methodology to compare and classify classical image denoising algorithms
Large margin methods for structured and interdependent output variables
- JOURNAL OF MACHINE LEARNING RESEARCH
, 2005
"... Learning general functional dependencies between arbitrary input and output spaces is one of the key challenges in computational intelligence. While recent progress in machine learning has mainly focused on designing flexible and powerful input representations, this paper addresses the complementary ..."
Abstract
-
Cited by 624 (12 self)
- Add to MetaCart
Learning general functional dependencies between arbitrary input and output spaces is one of the key challenges in computational intelligence. While recent progress in machine learning has mainly focused on designing flexible and powerful input representations, this paper addresses
Environmental Noise Main Focus: Aircraft Noise
, 2004
"... Following the recent general EU-directive 2002/49/EC on Assessment and Management of Environmental Noise, and thus focusing on noise produced by human activity, the Europäische Akademie zur Erforschung von Folgen wissenschaftlich-technischer Entwicklungen Bad Neuenahr-Ahrweiler ..."
Abstract
- Add to MetaCart
Following the recent general EU-directive 2002/49/EC on Assessment and Management of Environmental Noise, and thus focusing on noise produced by human activity, the Europäische Akademie zur Erforschung von Folgen wissenschaftlich-technischer Entwicklungen Bad Neuenahr-Ahrweiler
Large N field theories, string theory and gravity
, 2001
"... We review the holographic correspondence between field theories and string/M theory, focusing on the relation between compactifications of string/M theory on Anti-de Sitter spaces and conformal field theories. We review the background for this correspondence and discuss its motivations and the evide ..."
Abstract
-
Cited by 1443 (45 self)
- Add to MetaCart
and the evidence for its correctness. We describe the main results that have been derived from the correspondence in the regime that the field theory is approximated by classical or semiclassical gravity. We focus on the case of the N = 4 supersymmetric gauge theory in four dimensions, but we discuss also field
XORs in the air: practical wireless network coding
- In Proc. ACM SIGCOMM
, 2006
"... This paper proposes COPE, a new architecture for wireless mesh networks. In addition to forwarding packets, routers mix (i.e., code) packets from different sources to increase the information content of each transmission. We show that intelligently mixing packets increases network throughput. Our de ..."
Abstract
-
Cited by 548 (20 self)
- Add to MetaCart
design is rooted in the theory of network coding. Prior work on network coding is mainly theoretical and focuses on multicast traffic. This paper aims to bridge theory with practice; it addresses the common case of unicast traffic, dynamic and potentially bursty flows, and practical issues facing
Social capital, intellectual capital, and the organizational advantage
- Academy of Management Review
, 1998
"... Scholars of the theory of the firm have begun to emphasize the sources and conditions of what has been described a s "the organizational advantage, " rather than focus on the causes and consequences of market failure. Typically, researchers see such organizational advantage a s accruing fr ..."
Abstract
-
Cited by 1215 (2 self)
- Add to MetaCart
Scholars of the theory of the firm have begun to emphasize the sources and conditions of what has been described a s "the organizational advantage, " rather than focus on the causes and consequences of market failure. Typically, researchers see such organizational advantage a s accruing
SPINS: Security Protocols for Sensor Networks
, 2001
"... As sensor networks edge closer towards wide-spread deployment, security issues become a central concern. So far, the main research focus has been on making sensor networks feasible and useful, and less emphasis was placed on security. We design a suite of security building blocks that are optimized ..."
Abstract
-
Cited by 1094 (30 self)
- Add to MetaCart
As sensor networks edge closer towards wide-spread deployment, security issues become a central concern. So far, the main research focus has been on making sensor networks feasible and useful, and less emphasis was placed on security. We design a suite of security building blocks that are optimized
A Conceptual Framework and a Toolkit for Supporting the Rapid Prototyping of Context-Aware Applications
, 2001
"... Computing devices and applications are now used beyond the desktop, in diverse environments, and this trend toward ubiquitous computing is accelerating. One challenge that remains in this emerging research field is the ability to enhance the behavior of any application by informing it of the context ..."
Abstract
-
Cited by 906 (28 self)
- Add to MetaCart
removed from that vision. This is due to three main problems: (1) the notion of context is still ill defined; (2) there is a lack of conceptual models and methods to help drive the design of context-aware applications; and (3) no tools are available to jump-start the development of context
Results 1 - 10
of
43,350