This paper proposes a context-sensitive convolution tree kernel for pronoun resolution. It resolves two critical problems in previous researches in two ways. First, given a parse tree and a pair of an anaphor and an a...
详细信息
This paper proposes a semi-supervised learning method for relation extraction. Given a small amount of lab.led data and a large amount of unlab.led data, it first bootstraps a moderate number of weighted support vecto...
详细信息
This paper proposes a new scheme to determine the tree span structure for tree kernel-based anaphoricity determination in coreference resolution. Given a sentence and current mention, it gets all the dependencies, enc...
详细信息
This paper presents a new approach to selecting the initial seed set using stratified sampling strategy in bootstrapping-based semi-supervised learning for semantic relation classification. First, the training data is...
详细信息
In lager-scale P2P file sharing systems, peers often must interact with unknown or unfamiliar peers without the benefit of trusted third parties or authorities to mediate the interactions. The decentralized and anonym...
详细信息
ISBN:
(纸本)9783540725893
In lager-scale P2P file sharing systems, peers often must interact with unknown or unfamiliar peers without the benefit of trusted third parties or authorities to mediate the interactions. The decentralized and anonymous characteristics of P2P environments make the task of controlling access to sharing information more difficult. In this paper, we identify access control requirements and propose a trust based access control framework for P2P file-sharing systems. The model integrates aspects of trust and recommendation, fairness based participation schemes and access control schemes.
Transmembrane proteins play an important role in cellular energy production, signal transmission, metabolism. Existing machine learning methods are difficult to model the global correlation of the membrane protein seq...
详细信息
Although recent years have seen much progress in semantic role lab.ling in English, only a little research focuses on Chinese dependency relationship. This paper presents an SRL system on Chinese dependency relation b...
详细信息
Although recent years have seen much progress in semantic role lab.ling in English, only a little research focuses on Chinese dependency relationship. This paper presents an SRL system on Chinese dependency relation by using the similar method in an English SRL system. We also explore dependency-based predicate analysis in Chinese SRL. We perform our experiments on two datasets. Our results show that dependency-based Chinese SRL is not only feasible but also superior to the constituent-based SRL in some respects.
YCH scheme is a multi-secret sharing scheme based on two-variable one-way function and Shamir's threshold secret sharing scheme,but the scheme does not have the property of *** paper presents a verifiable multi-se...
详细信息
YCH scheme is a multi-secret sharing scheme based on two-variable one-way function and Shamir's threshold secret sharing scheme,but the scheme does not have the property of *** paper presents a verifiable multi-secret sharing scheme based on YCH scheme,RSA cryptosystem,and Schnorr *** dose not need a secure channel and each participant chooses his secret shadow by himself,and it can defend positive attack of dealer and participants.
In (k,m) -DOT1n scheme, the sender's privacy can not be guaranteed,even if the protocol itself is security,if we can not ensure that a receiver gets information from at most k *** Naor and Pinkas's scheme, the...
详细信息
In (k,m) -DOT1n scheme, the sender's privacy can not be guaranteed,even if the protocol itself is security,if we can not ensure that a receiver gets information from at most k *** Naor and Pinkas's scheme, they give two solutions that are applicable for the case k >m/2,in Nikov et al.'s scheme, they avoid this problem by means of implementing a m-out-of-m access *** this paper,we put forward a settlement for arbitrary k, in which the receiver only can choose k servers to interactive and solve the problem getting the desired security.
Generalized computing is a new kind of intelligent computing systems, which combines symbolic intelligence and computational intelligence (including neural computing, fuzzy computing and evolutional computing) togethe...
详细信息
Generalized computing is a new kind of intelligent computing systems, which combines symbolic intelligence and computational intelligence (including neural computing, fuzzy computing and evolutional computing) together. By introducing generalized computing into knowledge management, this paper presents a kind of knowledge decision-making model, and a kind of control model of enterprise knowledge flow.
暂无评论