登录
首页 » C# » AML-Efficient-Approximate-Membership

AML-Efficient-Approximate-Membership

于 2013-12-15 发布 文件大小:12598KB
0 149
下载积分: 1 下载次数: 3

代码说明:

  AML EFFICIENT APPROXIMATE MEMBERSHIP LOCALIZATION WITHIN A WEB-BASED JOIN FRAMEWORK ABSTRACT: In this paper, we propose a new type of Dictionary-based Entity Recognition Problem, named Approximate Membership Localization (AML). The popular Approximate Membership Extraction (AME) provides a full coverage to the true matched substrings from a given document, but many redundancies cause a low efficiency of the AME process and deteriorate the performance of real-world applications using the extracted substrings. The AML problem targets at locating non overlapped substrings which is a better approximation to the true matched substrings without generating overlapped redundancies. In order to perform AML efficiently, we propose the optimized algorithm P-Prune that prunes a large part of overlapped redundant matched substrings before generating them.

下载说明:请别用迅雷下载,失败请重下,重下不扣分!

发表评论

0 个回复

  • 865754765
    VB文件加密器(异或加密),有需要的就下载吧。(VB file encryption (XOR encryption), there is a need to download it.)
    2013-08-21 12:09:19下载
    积分:1
  • 关于IDEA算法的一个小程序
    关于IDEA算法的一个小程序-IDEA algorithm on a small program
    2022-11-30 04:10:04下载
    积分:1
  • 另一种编译文档案例。
    汇编加密文件另一例。-another compilation document encryption cases.
    2023-06-28 11:05:04下载
    积分:1
  • ASFDSAF
    题目:某个公司采用公用电话传递数据,数据是四位的整数,在传递过程中是加密的,加密规则如下:     每位数字都加上5,然后用和除以10的余数代替该数字,再将第一位和第四位交换,第二位和第三位交换。 1.程序分析: 2.程序源代码:(Topic: a company USES the public telephone relay data, data is four integers, in the relay in the process is encrypted, encryption rules are as follows: Each Numbers add 5, then use and divided by the number of 10 instead of a remnant, then the first and fourth exchange, the second and third exchange. 1. The program analysis: 2. The source code:)
    2012-05-26 20:07:28下载
    积分:1
  • a JAVA DES encryption
    一个JAVA的DES加密程序-a JAVA DES encryption
    2023-02-01 07:40:03下载
    积分:1
  • ISGCSSecure增强Client/Server系统安全的控件。(源代码,需注册)价格:$799。工作在:CB1 CB3 D3 D4 D5。作者:Infin...
    ISGCSSecure增强Client/Server系统安全的控件。(源代码,需注册)价格:$799。工作在:CB1 CB3 D3 D4 D5。作者:Infinity Software Group--Control which uses ISGCSSecure to enhanced Client/Server system security .(with source codes,needing register) price:$799.works in:CB1 CB3 D3 D4 D5.author:Infinity Software Group
    2023-01-07 05:05:03下载
    积分:1
  • Encodercodes
    加密解密(Encoder)C#源代码 v1.0 加密解密(Encoder),实现MD5加密,DES加密解密,RSA加密解密。使用的是System.Security.Cryptography 命名空间提供的相关类(Encryption and decryption (Encoder) C# source code v1.0 Encryption and decryption (Encoder), achieve MD5 encryption, DES encryption and decryption, RSA encryption and decryption. Using System.Security.Cryptography namespace provides related classes)
    2015-11-15 09:11:05下载
    积分:1
  •  使用cryptapi的demo程序
     使用cryptapi加密的demo程序-cryptapi use encryption procedures demo
    2022-01-25 23:14:22下载
    积分:1
  • base64编码源码,绝对可用。二机制十六进制转换
    base64编解码源码,绝对可用。二机制十六进制转换-base64 encode/decode in use
    2023-02-24 07:30:04下载
    积分:1
  • Caesar
    取代式密码的存在,已经超过2500年 以上,最早利 用的范例 是在西元600年 左右,内容是以颠倒的希伯來 文构成的。凯萨大帝(Julius Caesar)也曾经使用称为Caesar密码法。方法为将每个字母用其后的第三个字母來 取代。(Replace passwords existence, has more than 2,500 years or more, the first example is using a range of about the year 600 AD, the contents of the text is upside-down Heber future composition. Great Caesar (Julius Caesar) has also been known as the Caesar cipher using the method. Method is used then each letter is replaced by the third letter.)
    2011-10-31 22:52:37下载
    积分:1
  • 696518资源总数
  • 106215会员总数
  • 5今日下载