Sciweavers

4305 search results - page 222 / 861
» Analysing Protocol Implementations
Sort
View
ACL
1996
13 years 10 months ago
Resolving Anaphors in Embedded Sentences
We propose an Mgorithm to resolve anaphors, tackling mainly the problem of intrasentential antecedents. We base our methodology on the fact that such antecedents are likely to occ...
Saliha Azzam
ICASSP
2010
IEEE
13 years 9 months ago
Synthesis of filled pauses based on a disfluent speech model
In the present paper we present a new approach to the synthesis of filled pauses. The problem is tackled from the point of view of disfluent speech synthesis. Based on the synth...
Jordi Adell, Antonio Bonafonte, David Escudero Man...
ACSC
2005
IEEE
14 years 2 months ago
Optimising Parallel Pattern-matching by Source-level Program Transformation
Parallel pattern-matching (PPM) provides true commutative implementation of functions defined by cases in functional languages, because no argument is given precedence over any o...
R. Lyndon While, Tony Field
COMCOM
2007
83views more  COMCOM 2007»
13 years 9 months ago
Improving authentication of remote card transactions with mobile personal trusted devices
Credit card transactions are a popular and diffused means of payment over the network. Unfortunately, current technology does not allow us to technically solve disputes that may ...
Andrea Bottoni, Gianluca Dini
ENTCS
2007
104views more  ENTCS 2007»
13 years 9 months ago
Exogenous Probabilistic Computation Tree Logic
We define a logic EpCTL for reasoning about the evolution of probabilistic systems. System states correspond to probability distributions over classical states and the system evo...
Pedro Baltazar, Paulo Mateus, Rajagopal Nagarajan,...