نتایج جستجو برای: wrapper method

تعداد نتایج: 1632051  

2007
Shuyi Zheng Ruihua Song Ji-Rong Wen

Wrapper is a traditional method to extract useful information from Web pages. Most previous works rely on the similarity between HTML tag trees and induced template-dependent wrappers. When hundreds of information sources need to be extracted in a specific domain like news, it is costly to generate and maintain the wrappers. In this paper, we propose a novel templateindependent news extraction ...

Journal: :Computing and Informatics 2013
Roland Dobai Marcel Baláz

The current design and manufacturing semiconductor technologies require to test the products against delay related defects. However, complex systemon-chips (SOCs) require low-overhead testability methods to keep the test cost at an acceptable level. Skewed-load tests seem to be the appropriate way to test delay faults in these SOCs because the test application requires only one storage element ...

2013
Hsueh-Wei Chang Yu-Hsien Chiu Hao-Yun Kao Cheng-Hong Yang Wen-Hsien Ho

An essential task in a genomic analysis of a human disease is limiting the number of strongly associated genes when studying susceptibility to the disease. The goal of this study was to compare computational tools with and without feature selection for predicting osteoporosis outcome in Taiwanese women based on genetic factors such as single nucleotide polymorphisms (SNPs). To elucidate relatio...

2010
H. Wang S. R. Das M. Altinay J. Pluta J. Suh C. craige B. Avants P. Yushkevich

Introduction Accurate automatic segmentation is highly desirable in a large number of neuroimaging applications. Many software tools that address specific segmentation problems are available to today's researcher. However, end users of these tools are not always able to achieve the high levels of segmentation accuracy reported by the tool developers. Many factors may contribute to this discrepa...

Journal: :IEEE Transactions on Cognitive Communications and Networking 2021

Subsampling of received wireless signals is important for relaxing hardware requirements as well the computational cost signal processing algorithms that rely on output samples. We propose a subsampling technique to facilitate use deep learning automatic modulation classification in communication systems. Unlike traditional approaches pre-designed strategies are solely based expert knowledge, p...

Journal: :Applied Intelligence 2022

In this paper, we propose a new feature selection approach with partially labeled training examples in the multi-class classification setting. It is based on modification of genetic algorithm that creates and evaluates candidate subsets during an evolutionary process, taking into account weights recursively eliminating irrelevant features. To increase variety data, unlabeled observations are em...

2017
Peter Sewell Jan Vitek

We onsider the problem of assembling on urrent software systems from untrusted or partially trusted off-theshelf omponents, using wrapper programs to en apsulate omponents and enfor e se urity poli ies. In previous work we introdu ed the boxpro ess al ulus with onstrained intera tion to express wrappers and dis ussed the rigorous formulation of their se urity properties. This paper addresses th...

2001
Hiroshi Sakamoto Yoshitsugu Murakami Hiroki Arimura Setsuo Arikawa

The new wrapper model for extracting text data from HTML documents is introduced. In this model, an HTML file is considered as an ordered labeled tree. The learning algorithm takes the sequence of pairs of an HTML tree and a set of nodes The nodes indicate the labels to extract from the HTML tree. The goal of the learning algorithm is to output the wrapper which exactly extracts the labels from...

Journal: :CoRR 2017
Lars Birkedal Thomas Dinsdale-Young Guilhem Jaber Kasper Svendsen Nikos Tzevelekos

We propose a formal approach for relating abstract separation logic library specifications with the trace properties they enforce on interactions between a client and a library. Separation logic with abstract predicates enforces a resource discipline that constrains when and how calls may be made between a client and a library. Intuitively, this can enforce a protocol on the interaction trace. ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید