Sciweavers

877 search results - page 30 / 176
» How to Cover a Grammar
Sort
View
CORR
2004
Springer
78views Education» more  CORR 2004»
13 years 10 months ago
Polarity sensitivity and evaluation order in type-logical grammar
We present a novel, type-logical analysis of polarity sensitivity: how negative polarity items (like any and ever) or positive ones (like some) are licensed or prohibited. It take...
Chung-chieh Shan
ICGI
2010
Springer
13 years 9 months ago
Rademacher Complexity and Grammar Induction Algorithms: What It May (Not) Tell Us
Abstract. This paper revisits a problem of the evaluation of computational grammatical inference (GI) systems and discusses what role complexity measures can play for the assessmen...
Sophia Katrenko, Menno van Zaanen
ICPR
2004
IEEE
14 years 12 months ago
Neural Network-Based Proper Names Extraction in Fax Images
In this paper, we are interested in the sender's name extraction in fax cover pages through a machine learning scheme. For this purpose, two analysis methods are implemented ...
Laurence Likforman-Sulem, Noura Azzabou
ICDAR
2003
IEEE
14 years 4 months ago
Proper Names Extraction from Fax Images Combining Textual and Image Features
In the frame of a Unified Messaging System, a crucial task of the system is to provide the user with key information on every message received, like keywords reflecting the object...
Laurence Likforman-Sulem, Pascal Vaillant, Fran&cc...
CHES
2000
Springer
111views Cryptology» more  CHES 2000»
14 years 3 months ago
How to Explain Side-Channel Leakage to Your Kids
This paper will attempt to explain some of the side-channel attack techniques in a fashion that is easily comprehensible by the layman. What follows is a presentation of three diļ¬...
David Naccache, Michael Tunstall