Sciweavers

892 search results - page 38 / 179
» ets 2007
Sort
View
ACL
2008
13 years 11 months ago
Machine Translation System Combination using ITG-based Alignments
Given several systems' automatic translations of the same sentence, we show how to combine them into a confusion network, whose various paths represent composite translations...
Damianos Karakos, Jason Eisner, Sanjeev Khudanpur,...
JUCS
2008
143views more  JUCS 2008»
13 years 9 months ago
Certificateless Public Key Encryption Secure against Malicious KGC Attacks in the Standard Model
Abstract: Recently, Au et al. [Au et al. 2007] pointed out a seemingly neglected security concern for certificateless public key encryption (CL-PKE) scheme, where a malicious key g...
Yong Ho Hwang, Joseph K. Liu, Sherman S. M. Chow
ICML
2009
IEEE
14 years 10 months ago
Interactively optimizing information retrieval systems as a dueling bandits problem
We present an on-line learning framework tailored towards real-time learning from observed user behavior in search engines and other information retrieval systems. In particular, ...
Yisong Yue, Thorsten Joachims
ACL
2010
13 years 8 months ago
Incorporating Extra-Linguistic Information into Reference Resolution in Collaborative Task Dialogue
This paper proposes an approach to reference resolution in situated dialogues by exploiting extra-linguistic information. Recently, investigations of referential behaviours involv...
Ryu Iida, Syumpei Kobayashi, Takenobu Tokunaga
ICCS
2007
Springer
14 years 4 months ago
An ID-Based Random Key Pre-distribution Scheme for Wireless Sensor Networks
When wireless senor networks (WSNs) are deployed in hostile areas, they indeed need to be secured by security mechanisms. To do this, cryptographic keys must be agreed on by commun...
Tran Thanh Dai, Choong Seon Hong