• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 1,683
Next 10 →

Edit Detection and Parsing for Transcribed Speech

by Eugene Charniak, Mark Johnson - In Proc. NAACL , 2001
"... We present a simple architecture for parsing transcribed speech in which an edited-word detector first removes such words from the sentence string, and then a standard statistical parser trained on transcribed speech parses the remaining words. The edit detector achieves a misclassification rate on ..."
Abstract - Cited by 67 (6 self) - Add to MetaCart
We present a simple architecture for parsing transcribed speech in which an edited-word detector first removes such words from the sentence string, and then a standard statistical parser trained on transcribed speech parses the remaining words. The edit detector achieves a misclassification rate

Adaptive Duplicate Detection Using Learnable String Similarity Measures

by Mikhail Bilenko, Raymond J. Mooney - In Proceedings of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD-2003 , 2003
"... The problem of identifying approximately duplicate records in databases is an essential step for data cleaning and data integration processes. Most existing approaches have relied on generic or manually tuned distance metrics for estimating the similarity of potential duplicates. In this paper, we p ..."
Abstract - Cited by 344 (14 self) - Add to MetaCart
present a framework for improving duplicate detection using trainable measures of textual similarity. We propose to employ learnable text distance functions for each database field, and show that such measures are capable of adapting to the specific notion of similarity that is appropriate for the field

Eel: Machine-independent executable editing

by James R. Larus, Eric Schnarr - In Proceedings of the SIGPLAN ’95 Conference on Programming Language Design and Implementation (PLDI , 1995
"... EEL (Executable Editing Library) is a library for building tools to analyze and modify an executable (compiled) program. The systems and languages communities have built many tools for error detection, fault isolation, architecture translation, performance measurement, simulation, and optimization u ..."
Abstract - Cited by 298 (12 self) - Add to MetaCart
EEL (Executable Editing Library) is a library for building tools to analyze and modify an executable (compiled) program. The systems and languages communities have built many tools for error detection, fault isolation, architecture translation, performance measurement, simulation, and optimization

ENGLISH EDITION Detecting Fortresses in Chess

by Matej Guid, Ivan Bratko
"... Abstract. We introduce a computational method for semi-automatical detecting fortresses in the game of chess. It is based on computer heuristic search and can be easily used with any state-of-the-art chess program. We also demonstrate a method for avoiding fortresses and show how to find a break-thr ..."
Abstract - Add to MetaCart
Abstract. We introduce a computational method for semi-automatical detecting fortresses in the game of chess. It is based on computer heuristic search and can be easily used with any state-of-the-art chess program. We also demonstrate a method for avoiding fortresses and show how to find a break

Monitoring and self-repair in speech

by Willem J. M. Levelt - Cognition , 1983
"... Making a self-repair in speech typically proceeds in three phases. The first phase involves the monitoring of one’s own speech and the interruption of the flow of speech when trouble is detected. From an analysis of 959 spontaneous self-repairs it appears that interrupting follows detection promptly ..."
Abstract - Cited by 279 (11 self) - Add to MetaCart
promptly, with the exception that correct words tend to be completed. Another finding is that detection of trouble improves towards the end of constituents. The second phase is characterized by hesitation, pausing, but especially the use of so-called editing terms. Which editing term is used depends

Special effect edit detection using VideoTrails: a comparison with existing techniques

by Vikrant Kobla, Daniel DeMenthon, David Doermann , 1999
"... Video Segmentation plays an integral role in many multimedia applications such as digital libraries, content management systems, and various other video browsing, indexing, and retrieval systems. Many algorithms for segmentation of video have appeared in the past few years. Most of these algorithms ..."
Abstract - Cited by 16 (1 self) - Add to MetaCart
perform well on cuts, but yield poor performance on gradual transitions or special effect edits. A complete video segmentation system must achieve good performance on special effect edit detection also. In this paper, we discuss the performance of our VideoTrails based algorithms with other existing

Comparison of automatic shot boundary detection algorithms

by Rainer Lienhart , 1999
"... Various methods of automatic shot boundary detection have been proposed and claimed to perform reliably. Although the detection of edits is fundamental to any kind of video analysis since it segments a video into its basic components, the shots, only few comparative investigations on early shot boun ..."
Abstract - Cited by 160 (2 self) - Add to MetaCart
Various methods of automatic shot boundary detection have been proposed and claimed to perform reliably. Although the detection of edits is fundamental to any kind of video analysis since it segments a video into its basic components, the shots, only few comparative investigations on early shot

An Efficient Domain-Independent Algorithm for Detecting Approximately Duplicate Database Records

by Alvaro Monge, Charles Elkan , 1997
"... Detecting database records that are approximate duplicates, but not exact duplicates, is an important task. Databases may contain duplicate records concerning the same realworld entity because of data entry errors, because of unstandardized abbreviations, or because of differences in the detailed sc ..."
Abstract - Cited by 215 (2 self) - Add to MetaCart
Detecting database records that are approximate duplicates, but not exact duplicates, is an important task. Databases may contain duplicate records concerning the same realworld entity because of data entry errors, because of unstandardized abbreviations, or because of differences in the detailed

Change Detection in Hierarchically Structured Information

by Sudarshan S. Chawathe, Hector Garcia-molina, Jennifer Widom - In Proceedings of the 1996 ACM SIGMOD International Conference on Management of Data , 1996
"... {chaw,anand,hector, widom}%s.stanford. edu Detecting and representing changes to data is important for active databases, data warehousing, view maintenance, and version and configuration management. Most previous work in change management has dealt with flat-file and relational data; we focus on hie ..."
Abstract - Cited by 183 (11 self) - Add to MetaCart
on hierarchically structured data. Since in many cases changes must be computed from old and new versions of the data, we define the hierarchical change detection problem as the problem of finding a “minimum-cost edit script ” that transforms one data tree to another, and we present efficient algorithms

Partial and approximate symmetry detection for 3D geometry

by Niloy J. Mitra, Leonidas J. Guibas, Mark Pauly - ACM TRANSACTIONS ON GRAPHICS , 2006
"... “Symmetry is a complexity-reducing concept [...]; seek it everywhere.” Alan J. Perlis Many natural and man-made objects exhibit significant symmetries or contain repeated substructures. This paper presents a new algorithm that processes geometric models and efficiently discovers and extracts a com ..."
Abstract - Cited by 176 (26 self) - Add to MetaCart
the structure of a geometric model which in turn enables a large set of further processing operations, including shape compression, segmentation, consistent editing, symmetrization, indexing for retrieval, etc.
Next 10 →
Results 1 - 10 of 1,683
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University