Sciweavers

29 search results - page 5 / 6
» cas 2007
Sort
View
NAACL
1994
13 years 9 months ago
Semantic Evaluation for Spoken-Language Systems
Development has begun on a semantic evaluation (SemEval) methodology and infrastructure for the ARPA Spoken Language Program. SemEval is an attempt to define a task-independent te...
Robert C. Moore
INEX
2007
Springer
14 years 1 months ago
Using and Detecting Links in Wikipedia
In this paper, we document our efforts at INEX 2007 where we participated in the Ad Hoc Track, the Link the Wiki Track, and the Interactive Track that continued from INEX 2006. Ou...
Khairun Nisa Fachry, Jaap Kamps, Marijn Koolen, Ju...
IANDC
2008
120views more  IANDC 2008»
13 years 7 months ago
A framework for compositional verification of security protocols
Automatic security protocol analysis is currently feasible only for small protocols. Since larger protocols quite often are composed of many small protocols, compositional analysi...
Suzana Andova, Cas J. F. Cremers, Kristian Gj&osla...
ICC
2007
IEEE
134views Communications» more  ICC 2007»
14 years 2 months ago
Analysis of Code-Assisted Blind Synchronization for UWB Systems
— Timing synchronization is a preeminent challenge in ultra-wideband impulse radios (UWB-IRs). The conventional all-digital synchronization methods encounter some formidable impl...
Yeqiu Ying, Mounir Ghogho, Ananthram Swami
INFOSCALE
2007
ACM
13 years 9 months ago
A dubiety-determining based model for database cumulated anomaly intrusion
— The concept of Cumulated Anomaly (CA), which describes a new type of database anomalies, is addressed. A typical CA intrusion is that when a user who is authorized to modify da...
Gang Lu, Junkai Yi, Kevin Lü