Sciweavers

1355 search results - page 118 / 271
» Alternating Timed Automata over Bounded Time
Sort
View
FC
2010
Springer
135views Cryptology» more  FC 2010»
14 years 1 months ago
Multichannel Protocols to Prevent Relay Attacks
A number of security systems, from Chip-and-PIN payment cards to contactless subway and train tokens, as well as secure localization systems, are vulnerable to relay attacks. Encry...
Frank Stajano, Ford-Long Wong, Bruce Christianson
IJCAI
2007
13 years 10 months ago
A Ranking Approach to Pronoun Resolution
We propose a supervised maximum entropy ranking approach to pronoun resolution as an alternative to commonly used classification-based approaches. Classification approaches cons...
Pascal Denis, Jason Baldridge
CHI
2006
ACM
14 years 9 months ago
PygmyBrowse: a small screen tree browser
We present PygmyBrowse, a browser that allows users to navigate a tree data structure in a limited amount of display space. A pilot evaluation of PygmyBrowse was conducted, and re...
Zvi Band, Ryen W. White
ACL
2001
13 years 10 months ago
A Machine Learning Approach to the Automatic Evaluation of Machine Translation
We present a machine learning approach to evaluating the wellformedness of output of a machine translation system, using classifiers that learn to distinguish human reference tran...
Simon Corston-Oliver, Michael Gamon, Chris Brocket...
ICCV
2011
IEEE
12 years 9 months ago
Diffusion Runs Low on Persistence Fast
Interpreting an image as a function on a compact subset of the Euclidean plane, we get its scale-space by diffusion, spreading the image over the entire plane. This generates a 1-...
Chao Chen, Herbert Edelsbrunner