凹处 发表于 2025-3-30 09:45:14

http://reply.papertrans.cn/24/2328/232710/232710_51.png

湿润 发表于 2025-3-30 16:21:03

http://reply.papertrans.cn/24/2328/232710/232710_52.png

ELUDE 发表于 2025-3-30 16:49:33

https://doi.org/10.1007/978-3-319-64725-8 graphs, a hybrid content representation, (ii) performing graph matching to select candidate subgraphs, and (iii) subsequently using graphical models to validate hypotheses using ranked evidence trails. We adapt the DUC data set for cross-document summarization to evaluate evidence trails generated

秘传 发表于 2025-3-30 22:25:08

http://reply.papertrans.cn/24/2328/232710/232710_54.png

训诫 发表于 2025-3-31 04:43:49

Signature-Based Retrieval of Scanned Documents Using Conditional Random Fieldsquery. This chapter presents a signature retrieval strategy using document indexing and retrieval. Indexing is done using (i) a model based on Conditional Random Fields (CRF) to label extracted segments of scanned documents as Machine-Print, Signature and Noise, (ii) a technique using support vector

Esophagus 发表于 2025-3-31 06:24:11

http://reply.papertrans.cn/24/2328/232710/232710_56.png

Physiatrist 发表于 2025-3-31 12:42:37

http://reply.papertrans.cn/24/2328/232710/232710_57.png

SEED 发表于 2025-3-31 14:17:49

http://reply.papertrans.cn/24/2328/232710/232710_58.png

希望 发表于 2025-3-31 17:31:30

http://reply.papertrans.cn/24/2328/232710/232710_59.png
页: 1 2 3 4 5 [6]
查看完整版本: Titlebook: Computational Methods for Counterterrorism; Shlomo Argamon,Newton Howard Book 2009 Springer-Verlag Berlin Heidelberg 2009 Access.Counterte