Sciweavers

355 search results - page 49 / 71
» Security Test Generation Using Threat Trees
Sort
View
DSN
2004
IEEE
14 years 1 months ago
Diverse Firewall Design
Firewalls are the mainstay of enterprise security and the most widely adopted technology for protecting private networks. An error in a firewall policy either creates security hole...
Alex X. Liu, Mohamed G. Gouda
COLING
2010
13 years 4 months ago
Syntax Based Reordering with Automatically Derived Rules for Improved Statistical Machine Translation
Syntax based reordering has been shown to be an effective way of handling word order differences between source and target languages in Statistical Machine Translation (SMT) syste...
Karthik Visweswariah, Jiri Navratil, Jeffrey S. So...
ACL
2009
13 years 7 months ago
Unsupervised Multilingual Grammar Induction
We investigate the task of unsupervised constituency parsing from bilingual parallel corpora. Our goal is to use bilingual cues to learn improved parsing models for each language ...
Benjamin Snyder, Tahira Naseem, Regina Barzilay
CG
2006
Springer
13 years 10 months ago
Shape reasoning and understanding
s: clustering, denoising, sharp feature, shape abstraction, reverse engineering In this paper we describe a hierarchical face clustering algorithm for triangle meshes based on fit...
Bianca Falcidieno, Remco C. Veltkamp
JSS
2007
121views more  JSS 2007»
13 years 9 months ago
SEAL: A secure communication library for building dynamic group key agreement applications
We present the SEcure communicAtion Library (SEAL), a Linux-based C language application programming interface (API) library that implements secure group key agreement algorithms ...
Patrick P. C. Lee, John C. S. Lui, David K. Y. Yau