Sciweavers

2621 search results - page 361 / 525
» Generalized Algorithms for Constructing Statistical Language...
Sort
View
SIGSOFT
2005
ACM
14 years 10 months ago
Reasoning about confidentiality at requirements engineering time
Growing attention is being paid to application security at requirements engineering time. Confidentiality is a particular subclass of security concerns that requires sensitive inf...
Renaud De Landtsheer, Axel van Lamsweerde
CCS
2005
ACM
14 years 2 months ago
Keyboard acoustic emanations revisited
We examine the problem of keyboard acoustic emanations. We present a novel attack taking as input a 10-minute sound recording of a user typing English text using a keyboard, and t...
Li Zhuang, Feng Zhou, J. D. Tygar
ACL
2003
13 years 10 months ago
Synonymous Collocation Extraction Using Translation Information
Automatically acquiring synonymous collocation pairs such as <turn on, OBJ, light> and <switch on, OBJ, light> from corpora is a challenging task. For this task, we ca...
Hua Wu, Ming Zhou
WSDM
2009
ACM
113views Data Mining» more  WSDM 2009»
14 years 4 months ago
Time Will Tell: Leveraging Temporal Expressions in IR
Temporal expressions, such as between 1992 and 2000, are frequent across many kinds of documents. Text retrieval, though, treats them as common terms, thus ignoring their inherent...
Irem Arikan, Srikanta J. Bedathur, Klaus Berberich
HRI
2006
ACM
14 years 3 months ago
Structural descriptions in human-assisted robot visual learning
The paper presents an approach to using structural descriptions, obtained through a human-robot tutoring dialogue, as labels for the visual object models a robot learns. The paper...
Geert-Jan M. Kruijff, John D. Kelleher, Gregor Ber...