BORON EXTRACTORS EVALUATION

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Evaluation of Terminology Extractors: Principles and Experiments

We claim that the evaluation of terminology extraction systems cannot rely entirely on the comparison of their results with a reference list, as the very existence of such a list made up independently of any application is highly questionable and as these systems do not yield only actual terms but potential (or candidate) terms. We propose instead to align their results on various corpora, so a...

متن کامل

Combinatorial characterizations of extractors and Kolmogorov extractors

We present characterizations of extractors and Kolmogorov extractors in terms of a combinatorial object called balanced table. These characterizations provide an alternative proof for the relation between extractors and Kolmogorov extractors, first obtained in [FHP06] and [HPV09].

متن کامل

Defining a Gold Standard for the Evaluation of Term Extractors

We describe a methodology for constructing a gold standard for the automatic evaluation of term extractors, an important step toward establishing a much-needed evaluation protocol for term extraction systems. The gold standard proposed is a fully annotated corpus, constructed in accordance with a specific terminological setting (i.e. the compilation of a specialized dictionary of automotive mec...

متن کامل

Dimension Extractors

A dimension extractor is an algorithm designed to increase the effective dimension – i.e., the computational information density – of an infinite sequence. A constructive dimension extractor is exhibited by showing that every sequence of positive constructive dimension is Turing equivalent to a sequence of constructive strong dimension arbitrarily close to 1. Similar results are shown for compu...

متن کامل

Fuzzy Extractors

This chapter presents a general approach for handling secret biometric data in cryptographic applications. The generality manifests itself in two ways: we attempt to minimize the assumptions we make about the data, and to present techniques that are broadly applicable wherever biometric inputs are used. Because biometric data comes from a variety of sources that are mostly outside of anyone’s c...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: SOUTHERN BRAZILIAN JOURNAL OF CHEMISTRY

سال: 1999

ISSN: 0104-5431,2674-6891

DOI: 10.48141/sbjchem.v7.n8.1999.43_1999.pdf