Sciweavers

2972 search results - page 547 / 595
» The generic information extraction system
Sort
View
ACIVS
2009
Springer
13 years 9 months ago
Concealed Object Perception and Recognition Using a Photometric Stereo Strategy
Abstract. Following a review of current hidden objects detection techniques in a range of security applications, a strategy based on an innovative, low-cost photometric stereo tech...
Jiuai Sun, Melvyn L. Smith, Abdul R. Farooq, Lyndo...
EMNLP
2009
13 years 9 months ago
Sinuhe - Statistical Machine Translation using a Globally Trained Conditional Exponential Family Translation Model
We present a new phrase-based conditional exponential family translation model for statistical machine translation. The model operates on a feature representation in which sentenc...
Matti Kääriäinen
IESS
2009
Springer
182views Hardware» more  IESS 2009»
13 years 9 months ago
Modeling Cache Effects at the Transaction Level
Abstract. Embedded system design complexities are growing exponentially. Demand has increased for modeling techniques that can provide both accurate measurements of delay and fast ...
Ardavan Pedram, David Craven, Andreas Gerstlauer
TMC
2011
158views more  TMC 2011»
13 years 6 months ago
Explicit Congestion Control Algorithms for Time Varying Capacity Media
—Explicit congestion control (XCC) is emerging as one potential solution for overcoming limitations inherent to the current TCP algorithm, characterized by unstable throughput, h...
Filipe Abrantes, João Taveira Araujo, Manue...
JMLR
2010
185views more  JMLR 2010»
13 years 6 months ago
HMMPayl: an application of HMM to the analysis of the HTTP Payload
Zero-days attacks are one of the most dangerous threats against computer networks. These, by definition, are attacks never seen before. Thus, defense tools based on a database of ...
Davide Ariu, Giorgio Giacinto