Sciweavers

3146 search results - page 346 / 630
» Efficient Consequence Finding
Sort
View
ACL
2010
15 years 2 months ago
An Exact A* Method for Deciphering Letter-Substitution Ciphers
Letter-substitution ciphers encode a document from a known or hypothesized language into an unknown writing system or an unknown encoding of a known writing system. It is a proble...
Eric Corlett, Gerald Penn
ACL
2010
15 years 2 months ago
A Generalized-Zero-Preserving Method for Compact Encoding of Concept Lattices
Constructing an encoding of a concept lattice using short bit vectors allows for efficient computation of join operations on the lattice. Join is the central operation any unifica...
Matthew Skala, Victoria Krakovna, János Kra...
ACL
2010
15 years 2 months ago
Importance-Driven Turn-Bidding for Spoken Dialogue Systems
Current turn-taking approaches for spoken dialogue systems rely on the speaker releasing the turn before the other can take it. This reliance results in restricted interactions th...
Ethan Selfridge, Peter A. Heeman
BMVC
2010
15 years 2 months ago
Motion Coherent Tracking with Multi-label MRF optimization
We present a novel off-line algorithm for target segmentation and tracking in video. In our approach, video data is represented by a multi-label Markov Random Field model, and seg...
David Tsai, Matthew Flagg, James M. Rehg
BPM
2010
Springer
126views Business» more  BPM 2010»
15 years 2 months ago
Symbolic Execution of Acyclic Workflow Graphs
Abstract. We propose a new technique to analyze the control-flow, i.e., the workflow graph of a business process model, which we call symbolic execution. We consider acyclic workfl...
Cédric Favre, Hagen Völzer