Sciweavers

236 search results - page 22 / 48
» From Weak to Strong Watermarking
Sort
View
ACL
2009
13 years 7 months ago
Correlating Human and Automatic Evaluation of a German Surface Realiser
We examine correlations between native speaker judgements on automatically generated German text against automatic evaluation metrics. We look at a number of metrics from the MT a...
Aoife Cahill
IMCSIT
2010
13 years 7 months ago
RefGen: a Tool for Reference Chains Identification
In this paper we present RefGen, a reference chain identification module for French. RefGen algorithm uses genre specific properties of reference chains and an accessibility measur...
Laurence Longo, Amalia Todirascu
IH
2007
Springer
14 years 4 months ago
Security of Invertible Media Authentication Schemes Revisited
Abstract. Dittmann, Katzenbeisser, Schallhart and Veith (IACR ePrint 2004) introduced the notion of invertible media authentication schemes, embedding authentication data in media ...
Daniel Dönigus, Stefan Endler, Marc Fischlin,...
COORDINATION
2006
Springer
14 years 1 months ago
Stochastic Reasoning About Channel-Based Component Connectors
Abstract. Constraint automata have been used as an operational model for component connectors that coordinate the cooperation and communication of the components by means of a netw...
Christel Baier, Verena Wolf
ECCV
2006
Springer
13 years 11 months ago
Recognition and Segmentation of 3-D Human Action Using HMM and Multi-class AdaBoost
Our goal is to automatically segment and recognize basic human actions, such as stand, walk and wave hands, from a sequence of joint positions or pose angles. Such recognition is d...
Fengjun Lv, Ramakant Nevatia