Background: Protein secondary structure prediction method based on probabilistic models such as hidden Markov model (HMM) appeals to many because it provides meaningful informatio...
In the past independent IT security evaluation according to published criteria has not realized its potential for the assessment of privacy enhancing technologies (PETs). Main rea...
This workshop is aimed at reviewing and comparing existing Usability Evaluation Methods (UEMs) which are applicable to monomodal and multimodal applications, whether they are web-...
Signature identification and verification has been a topic of interest and importance for many years in the area of biometrics. In this paper we present an effective method to per...
Stephane Armand, Michael Blumenstein, Vallipuram M...
In this paper, we propose a novel dependency-based bracketing transduction grammar for statistical machine translation, which converts a source sentence into a target dependency t...
Jinsong Su, Yang Liu, Haitao Mi, Hongmei Zhao, Yaj...