Sciweavers

813 search results - page 81 / 163
» Pipeline-centric provenance model
Sort
View
SIGPRO
2008
155views more  SIGPRO 2008»
13 years 9 months ago
Recognition of off-line printed Arabic text using Hidden Markov Models
This paper describes a technique for automatic recognition of off-line printed Arabic text using Hidden Markov Models. In this work different sizes of overlapping and non-overlapp...
Husni A. Al-Muhtaseb, Sabri A. Mahmoud, Rami Qahwa...
BMCBI
2005
87views more  BMCBI 2005»
13 years 9 months ago
Efficient decoding algorithms for generalized hidden Markov model gene finders
Background: The Generalized Hidden Markov Model (GHMM) has proven a useful framework for the task of computational gene prediction in eukaryotic genomes, due to its flexibility an...
William H. Majoros, Mihaela Pertea, Arthur L. Delc...
IALP
2010
13 years 3 months ago
Sentence Similarity-Based Source Context Modelling in PBSMT
Target phrase selection, a crucial component of the state-of-the-art phrase-based statistical machine translation (PBSMT) model, plays a key role in generating accurate translation...
Rejwanul Haque, Sudip Kumar Naskar, Andy Way, Mart...
MIA
2011
170views more  MIA 2011»
13 years 3 months ago
Robust statistical shape models for MRI bone segmentation in presence of small field of view
Accurate bone modeling from medical images is essential in the diagnosis and treatment of patients because it supports the detection of abnormal bone morphology, which is often re...
Jérôme Schmid, Jinman Kim, Nadia Magn...
STOC
2005
ACM
132views Algorithms» more  STOC 2005»
14 years 9 months ago
Concurrent general composition of secure protocols in the timing model
In the setting of secure multiparty computation, a set of parties wish to to jointly compute some function of their input (i.e., they wish to securely carry out some distributed t...
Yael Tauman Kalai, Yehuda Lindell, Manoj Prabhakar...