Sciweavers

2391 search results - page 404 / 479
» A Portfolio Approach to Algorithm Selection
Sort
View
CCS
2008
ACM
14 years 12 months ago
Assessing query privileges via safe and efficient permission composition
We propose an approach for the selective enforcement of access control restrictions in, possibly distributed, large data collections based on two basic concepts: i) flexible autho...
Sabrina De Capitani di Vimercati, Sara Foresti, Su...
ASSETS
2005
ACM
14 years 12 months ago
Semantic knowledge in word completion
We propose an integrated approach to interactive word-completion for users with linguistic disabilities in which semantic knowledge combines with n-gram probabilities to predict s...
Jianhua Li, Graeme Hirst
FSE
2008
Springer
166views Cryptology» more  FSE 2008»
14 years 11 months ago
Accelerating the Whirlpool Hash Function Using Parallel Table Lookup and Fast Cyclical Permutation
Hash functions are an important building block in almost all security applications. In the past few years, there have been major advances in the cryptanalysis of hash functions, es...
Yedidya Hilewitz, Yiqun Lisa Yin, Ruby B. Lee
ACL
2007
14 years 11 months ago
Improved Word-Level System Combination for Machine Translation
Recently, confusion network decoding has been applied in machine translation system combination. Due to errors in the hypothesis alignment, decoding may result in ungrammatical co...
Antti-Veikko I. Rosti, Spyridon Matsoukas, Richard...
COLING
2008
14 years 11 months ago
Linguistically Annotated BTG for Statistical Machine Translation
Bracketing Transduction Grammar (BTG) is a natural choice for effective integration of desired linguistic knowledge into statistical machine translation (SMT). In this paper, we p...
Deyi Xiong, Min Zhang, AiTi Aw, Haizhou Li