Sciweavers

1061 search results - page 161 / 213
» A general definition of malware
Sort
View
SIAMJO
2000
63views more  SIAMJO 2000»
14 years 11 months ago
Pattern Search Methods for Linearly Constrained Minimization
This paper deals with generalized pattern search (GPS) algorithms for linearly constrained optimization. At each iteration, the GPS algorithm generates a set of directions that con...
Robert Michael Lewis, Virginia Torczon
MT
2002
118views more  MT 2002»
14 years 11 months ago
Principles of Context-Based Machine Translation Evaluation
This article defines a Framework for Machine Translation Evaluation (FEMTI) which relates the quality model used to evaluate a machine translation system to the purpose and context...
Eduard H. Hovy, Margaret King, Andrei Popescu-Beli...
PRL
2002
115views more  PRL 2002»
14 years 11 months ago
A generic fuzzy rule based image segmentation algorithm
Fuzzy rule based image segmentation techniques tend in general, to be application dependent with the structure of the membership functions being predefined and in certain cases, t...
Gour C. Karmakar, Laurence Dooley
TASLP
2002
110views more  TASLP 2002»
14 years 11 months ago
Automatic generation of subword units for speech recognition systems
Large vocabulary continuous speech recognition (LVCSR) systems traditionally represent words in terms of smaller subword units. Both during training and during recognition, they re...
Rita Singh, Bhiksha Raj, Richard M. Stern
TCS
2002
14 years 11 months ago
A truly concurrent semantics for a process algebra using resource pomsets
In this paper we study a process algebra whose semantics is based on true concurrency. In our model, actions are defined in terms of the resources they need to execute, which allo...
Paul Gastin, Michael W. Mislove