Sciweavers

1998 search results - page 357 / 400
» Basic Association Rules
Sort
View
CSREASAM
2006
13 years 10 months ago
Reinforcing Access Control Using Fuzzy Relation Equations
Current computer security systems are based on the premise that once a user presents valid credentials to the authentication system (e.g. valid ID and password), they are granted ...
Ali Berrached, André de Korvin
AAAI
1997
13 years 10 months ago
Deep Blue is Still an Infant
Webelieve that by the time of the workshopDeep Blue will havelost another matchto Garry Kasparov, showinglittle improvementover the previous one. But even if it is indeed a "...
Robert Levinson, Jeff Wilkinson
ACL
1997
13 years 10 months ago
Paradigmatic Cascades: a Linguistically Sound Model of Pronunciation by Analogy
We present and experimentally evaluate a new model of pronunciation by analogy: the paradigmatic cascades model. Given a pronunciation lexicon, this algorithm first extracts the m...
François Yvon
ANLP
1997
106views more  ANLP 1997»
13 years 10 months ago
Incremental Finite-State Parsing
This paper describes a new finite-state shallow parser. It merges constructive and reductionist approaches within a highly modular architecture. Syntactic information is added at ...
Salah Ait-Mokhtar, Jean-Pierre Chanod
AAAI
1994
13 years 10 months ago
Hierarchical Chunking in Classifier Systems
Two standard schemes for learning in classifier systems have been proposed in the literature: the bucket brigade algorithm (BBA) and the profit sharing plan (PSP). The BBA is a lo...
Gerhard Weiß