Sciweavers

2066 search results - page 312 / 414
» Word Maturity: Computational Modeling of Word Knowledge
Sort
View
B
2007
Springer
14 years 1 months ago
Security Policy Enforcement Through Refinement Process
Abstract. In the area of networks, a common method to enforce a security policy expressed in a high-level language is based on an ad-hoc and manual rewriting process [24]. We argue...
Nicolas Stouls, Marie-Laure Potet
ACL
2007
13 years 10 months ago
A Comparative Study of Parameter Estimation Methods for Statistical Natural Language Processing
This paper presents a comparative study of five parameter estimation algorithms on four NLP tasks. Three of the five algorithms are well-known in the computational linguistics com...
Jianfeng Gao, Galen Andrew, Mark Johnson, Kristina...
IPCV
2008
13 years 10 months ago
Speech Recognition System of Arabic Digits based on A Telephony Arabic Corpus
- Automatic recognition of spoken digits is one of the difficult tasks in the field of computer speech recognition. Spoken digits recognition process is required in many applicatio...
Yousef Alotaibi, Mansour Al-Ghamdi, Fahad Alotaiby
GRAPHICSINTERFACE
2003
13 years 10 months ago
Mixed Initiative Interactive Edge Detection
Interactive edge detection is used in both graphics art tools and in tools for building anatomical models from serially sectioned images. To build models, contours are traced and ...
Eric Neufeld, Haruna Popoola, David Callele, David...
DISOPT
2010
138views more  DISOPT 2010»
13 years 9 months ago
The Delivery Man Problem with time windows
In this paper, a variant of the Traveling Salesman Problem with Time Windows is considered, which consists in minimizing the sum of travel durations between a depot and several cu...
Géraldine Heilporn, Jean-François Co...