Sciweavers

2230 search results - page 146 / 446
» Evaluating Evaluation Methods for Generation in the Presence...
Sort
View
ACSAC
2007
IEEE
14 years 3 months ago
MetaAware: Identifying Metamorphic Malware
Detection of malicious software (malware) by the use of static signatures is often criticized for being overly simplistic. Available methods of obfuscating code (so-called metamor...
Qinghua Zhang, Douglas S. Reeves
EMNLP
2009
13 years 6 months ago
Multi-Word Expression Identification Using Sentence Surface Features
Much NLP research on Multi-Word Expressions (MWEs) focuses on the discovery of new expressions, as opposed to the identification in texts of known expressions. However, MWE identi...
Ram Boukobza, Ari Rappoport
CLEF
2007
Springer
14 years 3 months ago
Domain-Specific IR for German, English and Russian Languages
In participating in this CLEF evaluation campaign, our first objective is to propose and evaluate various indexing and search strategies for the Russian language, in order to obta...
Claire Fautsch, Ljiljana Dolamic, Samir Abdou, Jac...
PRICAI
2010
Springer
13 years 7 months ago
Layered Hypernetwork Models for Cross-Modal Associative Text and Image Keyword Generation in Multimodal Information Retrieval
Conventional methods for multimodal data retrieval use text-tag based or cross-modal approaches such as tag-image co-occurrence and canonical correlation analysis. Since there are ...
JungWoo Ha, Byoung-Hee Kim, Bado Lee, Byoung-Tak Z...
CDC
2008
IEEE
216views Control Systems» more  CDC 2008»
14 years 3 months ago
Robust limit cycle control in an attitude control system with switching-constrained actuators
Abstract— In this paper the robust behavior in some piecewise affine systems with minimally spaced transition times is studied. Such systems are found e.g. in satellites and sat...
Alexandre R. Mesquita, Karl Heinz Kienitz, Erico L...