Sciweavers

2687 search results - page 50 / 538
» On the Conversion between Number Systems
Sort
View
HICSS
2003
IEEE
164views Biometrics» more  HICSS 2003»
14 years 2 months ago
On a Text-Processing Approach to Facilitating Autonomous Deception Detection
Abstract—Current techniques towards information security have limited capabilities to detect and counter attacks that involve different kinds of masquerade and spread of misinfor...
Therani Madhusudan
ACL
2012
12 years 19 hour ago
Applications of GPC Rules and Character Structures in Games for Learning Chinese Characters
We demonstrate applications of psycholinguistic and sublexical information for learning Chinese characters. The knowledge about the grapheme-phoneme conversion (GPC) rules of lang...
Wei-Jie Huang, Chia-Ru Chou, Yu-Lin Tzeng, Chia-Yi...
ACL
2012
12 years 19 hour ago
Sentence Dependency Tagging in Online Question Answering Forums
Online forums are becoming a popular resource in the state of the art question answering (QA) systems. Because of its nature as an online community, it contains more updated knowl...
Zhonghua Qu, Yang Liu
DAC
2004
ACM
14 years 10 months ago
Automated fixed-point data-type optimization tool for signal processing and communication systems
A tool that automates the floating-point to fixed-point conversion (FFC) process for digital signal processing systems is described. The tool automatically optimizes fixed-point d...
Changchun Shi, Robert W. Brodersen
FC
2009
Springer
104views Cryptology» more  FC 2009»
14 years 4 months ago
Mitigating Inadvertent Insider Threats with Incentives
Inadvertent insiders are trusted insiders who do not have malicious intent (as with malicious insiders) but do not responsibly managing security. The result is often enabling a mal...
Debin Liu, XiaoFeng Wang, L. Jean Camp