Sciweavers

138 search results - page 25 / 28
» Linguistic Steganography Using Automatically Generated Parap...
Sort
View
FPGA
2006
ACM
117views FPGA» more  FPGA 2006»
13 years 11 months ago
Context-free-grammar based token tagger in reconfigurable devices
In this paper, we present reconfigurable hardware architecture for detecting semantics of streaming data on 1+ Gbps networks. The design leverages on the characteristics of contex...
Young H. Cho, James Moscola, John W. Lockwood
IPM
2007
105views more  IPM 2007»
13 years 7 months ago
Schema and constraints-based matching and merging of Topic Maps
In this paper, we propose a multi-strategic matching and merging approach to find correspondences between ontologies based on the syntactic or semantic characteristics and constr...
Jung-Min Kim, Hyopil Shin, Hyoung-Joo Kim
ACL2
2006
ACM
14 years 1 months ago
A verifying core for a cryptographic language compiler
A verifying compiler is one that emits both object code and a proof of correspondence between object and source code.1 We report the use of ACL2 in building a verifying compiler f...
Lee Pike, Mark Shields, John Matthews
FUZZIEEE
2007
IEEE
14 years 2 months ago
Self-Fuzzification Method According to Typicality Correlation for Classification on Tiny Data Sets
— This article presents a self-fuzzification method to enhance the settings of a Fuzzy Reasoning Classification adapted to the automated inspection of wooden boards. The supervis...
Emmanuel Schmitt, Vincent Bombardier, Patrick Char...
ACL
2010
13 years 5 months ago
Hunting for the Black Swan: Risk Mining from Text
In the business world, analyzing and dealing with risk permeates all decisions and actions. However, to date, risk identification, the first step in the risk management cycle, has...
Jochen L. Leidner, Frank Schilder