Sciweavers

2006 search results - page 288 / 402
» Heuristic Security-Testing Methods
Sort
View
JCC
2008
166views more  JCC 2008»
13 years 9 months ago
Reference energy extremal optimization: A stochastic search algorithm applied to computational protein design
: We adapt a combinatorial optimization algorithm, extremal optimization (EO), for the search problem in computational protein design. This algorithm takes advantage of the knowled...
Naigong Zhang, Chen Zeng
INFFUS
2006
103views more  INFFUS 2006»
13 years 9 months ago
Information fusion approaches to the automatic pronunciation of print by analogy
Automatic pronunciation of words from their spelling alone is a hard computational problem, especially for languages like English and French where there is only a partially consis...
Robert I. Damper, Yannick Marchand
JCST
2008
138views more  JCST 2008»
13 years 9 months ago
Predicting Chinese Abbreviations from Definitions: An Empirical Learning Approach Using Support Vector Regression
In Chinese, phrases and named entities play a central role in information retrieval. Abbreviations, however, make keyword-based approaches less effective. This paper presents an em...
Xu Sun, Houfeng Wang, Bo Wang 0003
AAMAS
2002
Springer
13 years 9 months ago
Multiagent Learning for Open Systems: A Study in Opponent Classification
Abstract. Open systems are becoming increasingly important in a variety of distributed, networked computer applications. Their characteristics, such as agent diversity, heterogenei...
Michael Rovatsos, Gerhard Weiß, Marco Wolf
CSL
2004
Springer
13 years 9 months ago
Word sense disambiguation of WordNet glosses
This paper presents a suite of methods and results for the semantic disambiguation of WordNet glosses. WordNet is a resource widely used in natural language processing and artific...
Dan I. Moldovan, Adrian Novischi