Sciweavers

5621 search results - page 1100 / 1125
» Augmentation of adaptation data
Sort
View
96
Voted
LREC
2008
75views Education» more  LREC 2008»
15 years 3 months ago
Experimental Fast-Tracking of Morphological Analysers for Nguni Languages
The development of natural language processing (NLP) components is resource-intensive and therefore justifies exploring ways of reducing development time and effort when building ...
Sonja E. Bosch, Laurette Pretorius, Kholisa Podile...
132
Voted
AAAI
2006
15 years 3 months ago
The Robot Intelligence Kernel
The Robot Intelligence Kernel (RIK) is a portable, reconfigurable suite of perceptual, behavioral, and cognitive capabilities that can be used across many different platforms, env...
David J. Bruemmer, Douglas A. Few, Miles C. Walton...
AAAI
2006
15 years 3 months ago
AWDRAT: A Cognitive Middleware System for Information Survivability
The Infrastructure of modern society is controlled by software systems that are vulnerable to attacks. Many such attacks, launched by "recreational hackers" have already...
Howard E. Shrobe, Robert Laddaga, Robert Balzer, N...
APBC
2004
122views Bioinformatics» more  APBC 2004»
15 years 3 months ago
Evolution of Relative Synonymous Codon Usage in Human Immunodeficiency Virus Type 1
Mutation in HIV-1 is extremely rapid, a consequence of a low-fidelity viral reverse transcription process. The envelope gene has been shown to accumulate substitutions at a rate o...
Peter L. Meintjes, Allen G. Rodrigo
123
Voted
CSREASAM
2006
15 years 3 months ago
Reinforcing Access Control Using Fuzzy Relation Equations
Current computer security systems are based on the premise that once a user presents valid credentials to the authentication system (e.g. valid ID and password), they are granted ...
Ali Berrached, André de Korvin
« Prev « First page 1100 / 1125 Last » Next »