Sciweavers

2006 search results - page 350 / 402
» Heuristic Security-Testing Methods
Sort
View
WICON
2010
13 years 7 months ago
Optimized Content Caching and Request Capture in CNF Networks
In order to meet the overwhelming demands of content retrieval for mobile end users, a novel architecture for the next-generation Internet called Cache-and-Forward (CNF) has been p...
Lijun Dong, Dan Zhang, Yanyong Zhang, Dipankar Ray...
EMNLP
2009
13 years 7 months ago
Sinuhe - Statistical Machine Translation using a Globally Trained Conditional Exponential Family Translation Model
We present a new phrase-based conditional exponential family translation model for statistical machine translation. The model operates on a feature representation in which sentenc...
Matti Kääriäinen
ICPR
2006
IEEE
14 years 10 months ago
Statistical Model for the Classification of the Wavelet Transforms of T-ray Pulses
This study applies Auto Regressive (AR) and Auto Regressive Moving Average (ARMA) modeling to wavelet decomposed terahertz pulsed signals to assist biomedical diagnosis and mail/p...
Bradley Ferguson, Brian Wai-Him Ng, Derek Abbott, ...
ICCAD
2002
IEEE
161views Hardware» more  ICCAD 2002»
14 years 6 months ago
Non-tree routing for reliability and yield improvement
We propose to introduce redundant interconnects for manufacturing yield and reliability improvement. By introducing redundant interconnects, the potential for open faults is reduc...
Andrew B. Kahng, Bao Liu, Ion I. Mandoiu
WWW
2010
ACM
14 years 4 months ago
Relational duality: unsupervised extraction of semantic relations between entities on the web
Extracting semantic relations among entities is an important first step in various tasks in Web mining and natural language processing such as information extraction, relation de...
Danushka Bollegala, Yutaka Matsuo, Mitsuru Ishizuk...