Sciweavers

2874 search results - page 525 / 575
» Intrusion Detection: Systems and Models
Sort
View
NAACL
2003
13 years 11 months ago
Comma Restoration Using Constituency Information
Automatic restoration of punctuation from unpunctuated text has application in improving the fluency and applicability of speech recognition systems. We explore the possibility t...
Stuart M. Shieber, Xiaopeng Tao
IPPS
2010
IEEE
13 years 7 months ago
Runtime checking of serializability in software transactional memory
Abstract--Ensuring the correctness of complex implementations of software transactional memory (STM) is a daunting task. Attempts have been made to formally verify STMs, but these ...
Arnab Sinha, Sharad Malik
NPAR
2000
ACM
14 years 2 months ago
Stylized rendering techniques for scalable real-time 3D animation
Researchers in nonphotorealistic rendering (NPR) have investigated a variety of techniques to simulate the styles of artists. Recent work has resulted in methods for pen-and-ink i...
Adam Lake, Carl Marshall, Mark Harris, Marc Blacks...
IJCNN
2006
IEEE
14 years 4 months ago
Small-catchment flood forecasting and drainage network extraction using computational intelligence
— Forecast, detection and warning of severe weather and related hydro-geological risks is becoming one of the major issues for civil protection. The use of computational intellig...
Erika Coppola, Barbara Tomassetti, Marco Verdecchi...
ICCD
2000
IEEE
119views Hardware» more  ICCD 2000»
14 years 1 months ago
Source-Level Transformations for Improved Formal Verification
A major obstacle to widespread acceptance of formal verification is the difficulty in using the tools effectively. Although learning the basic syntax and operation of a formal ver...
Brian D. Winters, Alan J. Hu