Sciweavers

1466 search results - page 220 / 294
» Completeness of the Authentication Tests
Sort
View
ACL
2008
13 years 9 months ago
Learning Bigrams from Unigrams
Traditional wisdom holds that once documents are turned into bag-of-words (unigram count) vectors, word orders are completely lost. We introduce an approach that, perhaps surprisi...
Xiaojin Zhu, Andrew B. Goldberg, Michael Rabbat, R...
LREC
2010
142views Education» more  LREC 2010»
13 years 9 months ago
Partial Parsing as a Method to Expedite Dependency Annotation of a Hindi Treebank
The paper describes an approach to expedite the process of manual annotation of a Hindi dependency treebank which is currently under development. We propose a way by which consist...
Mridul Gupta, Vineet Yadav, Samar Husain, Dipti Mi...
DAGSTUHL
2008
13 years 9 months ago
Uniprocessor EDF Feasibility is an Integer Problem
The research on real-time scheduling has mostly focused on the development of algorithms that allows to test whether the constraints imposed on the task execution (often expressed ...
Enrico Bini
GRAPHICSINTERFACE
2007
13 years 9 months ago
TwoStick: writing with a game controller
We report the design and evaluation of a novel game controller text entry method called TwoStick. The design is based on the review of previous work and several rounds of pilot te...
Thomas Költringer, Poika Isokoski, Thomas Gre...
IADIS
2008
13 years 9 months ago
Data Mining Applications in Intelligent Integrated Development Environments
Programming and developing of small scale software applications can be accomplished with simple command-line compilers that can be used to compile, test, and execute code generati...
Ali Farahmand Nejad, Shahabedin Bayati, Sadegh Kha...