Sciweavers

1105 search results - page 32 / 221
» From Languages to Systems: Understanding Practical Applicati...
Sort
View
CIIT
2004
132views Communications» more  CIIT 2004»
13 years 9 months ago
A vulnerability taxonomy for network protocols: Corresponding engineering best practice countermeasures
Vulnerabilities arising from in-secure network protocol design and implementation present significant challenges to the network protocol community. Yet much of the focus is on sof...
Venkat Pothamsetty, Bora A. Akyol
PRL
2002
94views more  PRL 2002»
13 years 7 months ago
A hierarchical tag-graph search scheme with layered grammar rules for spontaneous speech understanding
It has always been difficult for language understanding systems to handle spontaneous speech with satisfactory robustness, primarily due to such problems as the fragments, disflue...
Bor-shen Lin, Berlin Chen, Hsin-Min Wang, Lin-Shan...
AIED
2005
Springer
14 years 1 months ago
Iterative Evaluation of a Large-Scale, Intelligent Game for Language Learning
Educational content developers, including AIED developers, traditionally make a distinction between formative evaluation and summative evaluation of learning materials. Although th...
W. Lewis Johnson, Carole R. Beal
ACL
2010
13 years 5 months ago
An Exact A* Method for Deciphering Letter-Substitution Ciphers
Letter-substitution ciphers encode a document from a known or hypothesized language into an unknown writing system or an unknown encoding of a known writing system. It is a proble...
Eric Corlett, Gerald Penn
VLSID
2002
IEEE
174views VLSI» more  VLSID 2002»
14 years 8 months ago
Architecture Implementation Using the Machine Description Language LISA
The development of application specific instruction set processors comprises several design phases: architecture exploration, software tools design, system verification and design...
Oliver Schliebusch, Andreas Hoffmann, Achim Nohl, ...