Sciweavers

1054 search results - page 123 / 211
» Model Transformations in the Model-Based Development of Real...
Sort
View
IWSEC
2009
Springer
14 years 3 months ago
Tamper-Tolerant Software: Modeling and Implementation
Abstract. Common software-protection systems attempt to detect malicious observation and modification of protected applications. Upon tamper detection, anti-hacking code may produ...
Mariusz H. Jakubowski, Chit Wei Saw, Ramarathnam V...
EMNLP
2004
13 years 10 months ago
Comparing and Combining Generative and Posterior Probability Models: Some Advances in Sentence Boundary Detection in Speech
We compare and contrast two different models for detecting sentence-like units in continuous speech. The first approach uses hidden Markov sequence models based on N-grams and max...
Yang Liu, Andreas Stolcke, Elizabeth Shriberg, Mar...
COLING
2008
13 years 10 months ago
Sentence Type Based Reordering Model for Statistical Machine Translation
Many reordering approaches have been proposed for the statistical machine translation (SMT) system. However, the information about the type of source sentence is ignored in the pr...
Jiajun Zhang, Chengqing Zong, Shoushan Li
IUI
2000
ACM
14 years 1 months ago
Adaptation in automated user-interface design
Design problems involve issues of stylistic preference and flexible standards of success; human designers often proceed by intuition and are unaware of following any strict rule-b...
Jacob Eisenstein, Angel R. Puerta
INFOCOM
2006
IEEE
14 years 3 months ago
A Quasi-Species Approach for Modeling the Dynamics of Polymorphic Worms
— Polymorphic worms can change their byte sequence as they replicate and propagate, thwarting the traditional signature analysis techniques used by many intrusion detection syste...
Bradley Stephenson, Biplab Sikdar