Sciweavers

2006 search results - page 290 / 402
» Heuristic Security-Testing Methods
Sort
View
IPM
2010
133views more  IPM 2010»
13 years 8 months ago
A concept-relationship acquisition and inference approach for hierarchical taxonomy construction from tags
Taxonomy construction is a resource-demanding, top down, and time consuming effort. It does not always cater for the prevailing context of the captured information. This paper pro...
Eric Tsui, W. M. Wang, Chi Fai Cheung, Adela S. M....
IEEEHPCS
2010
13 years 7 months ago
Reducing memory requirements of stream programs by graph transformations
Stream languages explicitly describe fork-join parallelism and pipelines, offering a powerful programming model for many-core Multi-Processor Systems on Chip (MPSoC). In an embedd...
Pablo de Oliveira Castro, Stéphane Louise, ...
ACL
2009
13 years 7 months ago
Exploiting Heterogeneous Treebanks for Parsing
We address the issue of using heterogeneous treebanks for parsing by breaking it down into two sub-problems, converting grammar formalisms of the treebanks to the same one, and pa...
Zheng-Yu Niu, Haifeng Wang, Hua Wu
EMNLP
2009
13 years 7 months ago
Generalized Expectation Criteria for Bootstrapping Extractors using Record-Text Alignment
Traditionally, machine learning approaches for information extraction require human annotated data that can be costly and time-consuming to produce. However, in many cases, there ...
Kedar Bellare, Andrew McCallum
ICIP
2009
IEEE
13 years 7 months ago
Improving the quality of depth image based rendering for 3D Video systems
In 3D Video (3DV) applications, a reduced number of views plus depth maps are transmitted or stored. When there is a need to render virtual views in between the actual views, the ...
Zefeng Ni, Dong Tian, Sitaram Bhagavathy, Joan Lla...