Sciweavers

254 search results - page 32 / 51
» How Talker Identity Relates to Language Processing
Sort
View
CCS
2007
ACM
14 years 1 months ago
Specifying and analyzing security automata using CSP-OZ
Security automata are a variant of B¨uchi automata used to specify security policies that can be enforced by monitoring system execution. In this paper, we propose using CSP-OZ, ...
David A. Basin, Ernst-Rüdiger Olderog, Paul E...
CLEF
2007
Springer
14 years 1 months ago
Unsupervised Acquiring of Morphological Paradigms from Tokenized Text
This paper describes a rather simplistic method of unsupervised morphological analysis of words in an unknown language. All what is needed is a raw text corpus in the given langua...
Daniel Zeman
NLDB
2004
Springer
14 years 1 months ago
Concept Similarity Measures the Understanding Between Two Agents
When knowledge in each agent is represented by an ontology of concepts and relations, concept communication can not be fulfilled through exchanging concepts (ontology nodes). Inste...
Jesus M. Olivares-Ceja, Adolfo Guzmán-Arena...
ICML
2007
IEEE
14 years 8 months ago
Unsupervised estimation for noisy-channel models
Shannon's Noisy-Channel model, which describes how a corrupted message might be reconstructed, has been the corner stone for much work in statistical language and speech proc...
Markos Mylonakis, Khalil Sima'an, Rebecca Hwa
PODS
2010
ACM
242views Database» more  PODS 2010»
14 years 22 days ago
Certain answers for XML queries
The notion of certain answers arises when one queries incompletely specified databases, e.g., in data integration and exchange scenarios, or databases with missing information. W...
Claire David, Leonid Libkin, Filip Murlak