Sciweavers

2944 search results - page 70 / 589
» On Well Quasi-orders on Languages
Sort
View
COMPSAC
2005
IEEE
14 years 2 months ago
Detecting Intrusions Specified in a Software Specification Language
To protect software against malicious activities, organizations are required to monitor security breaches. Intrusion Detection Systems (IDS) are those kinds of monitoring tools th...
Mohammad Feroz Raihan, Mohammad Zulkernine
IAW
2003
IEEE
14 years 2 months ago
Insecure Programming: How Culpable is a Language's Syntax?
— Vulnerabilities in software stem from poorly written code. Inadvertent errors may creep in due to programmers not being aware of the security implications of their code. Writin...
Ramkumar Chinchani, Anusha Iyer, Bharat Jayaraman,...
FGR
2002
IEEE
171views Biometrics» more  FGR 2002»
14 years 1 months ago
An Approach Based on Phonemes to Large Vocabulary Chinese Sign Language Recognition
Hitherto, the major challenge to sign language recognition is how to develop approaches that scale well with increasing vocabulary size. In this paper we present an approach to la...
Chunli Wang, Shiguang Shan, Wen Gao
ATAL
2008
Springer
13 years 10 months ago
Extending agent languages for autonomy
BDI agent languages provide a useful abstraction for complex systems comprised of interactive autonomous entities, but they have been used mostly in the context of single agents w...
Felipe Rech Meneguzzi
CICLING
2008
Springer
13 years 10 months ago
Natural Language as the Basis for Meaning Representation and Inference
Abstract. Semantic inference is an important component in many natural language understanding applications. Classical approaches to semantic inference rely on logical representatio...
Ido Dagan, Roy Bar-Haim, Idan Szpektor, Iddo Green...