Sciweavers

2132 search results - page 298 / 427
» The Challenges of Automatic Summarization
Sort
View
CCS
2007
ACM
14 years 3 months ago
Topological analysis of network attack vulnerability
: To understand overall vulnerability to network attack, one must consider attacker exploits not just in isolation, but also in combination. That is, one must analyze how low-level...
Sushil Jajodia
CLEAR
2007
Springer
153views Biometrics» more  CLEAR 2007»
14 years 3 months ago
The 2007 AMI(DA) System for Meeting Transcription
Abstract Meeting transcription is one of the main tasks for large vocabulary automatic speech recognition (ASR) and is supported by several large international projects in the area...
Thomas Hain, Lukas Burget, John Dines, Giulia Gara...
ESWS
2007
Springer
14 years 3 months ago
Empowering Software Maintainers with Semantic Web Technologies
Abstract. Software maintainers routinely have to deal with a multitude of artifacts, like source code or documents, which often end up disconnected, due to their different represen...
René Witte, Yonggang Zhang, Juergen Rilling
FPL
2007
Springer
137views Hardware» more  FPL 2007»
14 years 3 months ago
Multi-processor System-level Synthesis for Multiple Applications on Platform FPGA
Multiprocessor systems-on-chip (MPSoC) are being developed in increasing numbers to support the high number of applications running on modern embedded systems. Designing and progr...
Akash Kumar, Shakith Fernando, Yajun Ha, Bart Mesm...
GREC
2007
Springer
14 years 3 months ago
A System to Segment Text and Symbols from Color Maps
Automatic separation of text and symbols from graphics in document image is one of the fundamental aims in graphics recognition. In maps, separation of text and symbols from graphi...
Partha Pratim Roy, Eduard Vazquez, Josep Llad&oacu...