Sciweavers

117 search results - page 14 / 24
» Isolating cause-effect chains from computer programs
Sort
View
138
Voted
IDEAL
2010
Springer
15 years 11 days ago
Trajectory Based Behavior Analysis for User Verification
Many of our activities on computer need a verification step for authorized access. The goal of verification is to tell apart the true account owner from intruders. We propose a gen...
Hsing-Kuo Pao, Hong-Yi Lin, Kuan-Ta Chen, Junaidil...
122
Voted
LCTRTS
2005
Springer
15 years 8 months ago
Efficient application migration under compiler guidance
Mobile computing based upon wireless technology as the interconnect and PDAs, Web-enabled cell phones etc. as the end devices provide a rich infrastructure for anywhere, anytime i...
Kun Zhang, Santosh Pande
118
Voted
ACL
2009
15 years 8 days ago
Unsupervised Multilingual Grammar Induction
We investigate the task of unsupervised constituency parsing from bilingual parallel corpora. Our goal is to use bilingual cues to learn improved parsing models for each language ...
Benjamin Snyder, Tahira Naseem, Regina Barzilay
120
Voted
COGSR
2011
105views more  COGSR 2011»
14 years 9 months ago
Inductive rule learning on the knowledge level
We present an application of the analytical inductive programming system Igor to learning sets of recursive rules from positive experience. We propose that this approach can be us...
Ute Schmid, Emanuel Kitzelmann
140
Voted
SAC
2004
ACM
15 years 7 months ago
Seamless integration of rule-based knowledge and object-oriented functionality with linguistic symbiosis
Software applications often contain implicit knowledge in addition to functionality which is inherently object-oriented. Many approaches and systems exist that focus on separating...
Maja D'Hondt, Kris Gybels, Viviane Jonckers