Sciweavers

2066 search results - page 220 / 414
» Word Maturity: Computational Modeling of Word Knowledge
Sort
View
EMS
2008
IEEE
15 years 7 months ago
Threat Modeling Revisited: Improving Expressiveness of Attack
Threat modeling plays an important role in the deployment of optimal security controls and a number of threat modeling techniques have been proposed. However, most of the existing...
Drake Patrick Mirembe, Maybin K. Muyeba
CORR
2010
Springer
166views Education» more  CORR 2010»
15 years 5 months ago
Bandwidth Modeling and Estimation in Peer to Peer Networks
Recent studies have shown that the majority of today's internet traffic is related to Peer to Peer (P2P) traffic. The study of bandwidth in P2P networks is very important. Bec...
Kiarash Mizanian, Mehdi Vasef, Morteza Analoui
SOCIALCOM
2010
15 years 2 days ago
The Swarm Model in Open Source Software Developer Communities
Most of the current swarm model studies and applications try to mimic the collective behaviors of social animals, such as birds and ants. The studies seek to solve tasks similar to...
Xiaohui Cui, Justin M. Beaver, Everett Stiles, Lau...
EMNLP
2008
15 years 6 months ago
A Simple and Effective Hierarchical Phrase Reordering Model
While phrase-based statistical machine translation systems currently deliver state-of-theart performance, they remain weak on word order changes. Current phrase reordering models ...
Michel Galley, Christopher D. Manning
INTERSPEECH
2010
15 years 5 days ago
Recurrent neural network based language model
A new recurrent neural network based language model (RNN LM) with applications to speech recognition is presented. Results indicate that it is possible to obtain around 50% reduct...
Tomas Mikolov, Martin Karafiát, Lukas Burge...