Sciweavers

251 search results - page 49 / 51
» Dependency parser demo
Sort
View
SIGSOFT
2003
ACM
14 years 11 months ago
Towards scalable compositional analysis by refactoring design models
Automated finite-state verification techniques have matured considerably in the past several years, but state-space explosion remains an obstacle to their use. Theoretical lower b...
Yung-Pin Cheng, Michal Young, Che-Ling Huang, Chia...
IWRIDL
2006
ACM
141views Education» more  IWRIDL 2006»
14 years 4 months ago
Shallow syntax analysis in Sanskrit guided by semantic nets constraints
We present the state of the art of a computational platform for the analysis of classical Sanskrit. The platform comprises modules for phonology, morphology, segmentation and shal...
Gérard P. Huet
BMCBI
2007
124views more  BMCBI 2007»
13 years 11 months ago
BioInfer: a corpus for information extraction in the biomedical domain
Background: Lately, there has been a great interest in the application of information extraction methods to the biomedical domain, in particular, to the extraction of relationship...
Sampo Pyysalo, Filip Ginter, Juho Heimonen, Jari B...
DASFAA
2009
IEEE
195views Database» more  DASFAA 2009»
14 years 5 months ago
The XMLBench Project: Comparison of Fast, Multi-platform XML libraries
The XML technologies have brought a lot of new ideas and abilities in the field of information management systems. Nowadays, XML is used almost everywhere: from small configurati...
Suren Chilingaryan
CSFW
2009
IEEE
14 years 5 months ago
Inputs of Coma: Static Detection of Denial-of-Service Vulnerabilities
—As networked systems grow in complexity, they are increasingly vulnerable to denial-of-service (DoS) attacks involving resource exhaustion. A single malicious input of coma can ...
Richard M. Chang, Guofei Jiang, Franjo Ivancic, Sr...