Sciweavers

3640 search results - page 669 / 728
» Combining Fuzzy Information from Multiple Systems
Sort
View
109
Voted
ICPADS
2010
IEEE
14 years 10 months ago
Fault Tolerant Network Routing through Software Overlays for Intelligent Power Grids
Control decisions of intelligent devices in critical infrastructure can have a significant impact on human life and the environment. Insuring that the appropriate data is availabl...
Christopher Zimmer, Frank Mueller
88
Voted
NAACL
2010
14 years 10 months ago
Integrating Joint n-gram Features into a Discriminative Training Framework
Phonetic string transduction problems, such as letter-to-phoneme conversion and name transliteration, have recently received much attention in the NLP community. In the past few y...
Sittichai Jiampojamarn, Colin Cherry, Grzegorz Kon...
112
Voted
WCET
2010
14 years 10 months ago
METAMOC: Modular Execution Time Analysis using Model Checking
Safe and tight worst-case execution times (WCETs) are important when scheduling hard realtime systems. This paper presents METAMOC, a modular method, based on model checking and s...
Andreas E. Dalsgaard, Mads Chr. Olesen, Martin Tof...
93
Voted
ACL
2009
14 years 10 months ago
Case markers and Morphology: Addressing the crux of the fluency problem in English-Hindi SMT
We report in this paper our work on accurately generating case markers and suffixes in English-to-Hindi SMT. Hindi is a relatively free word-order language, and makes use of a com...
Ananthakrishnan Ramanathan, Hansraj Choudhary, Avi...
CORR
2010
Springer
286views Education» more  CORR 2010»
14 years 9 months ago
PhishDef: URL Names Say It All
Phishing is an increasingly sophisticated method to steal personal user information using sites that pretend to be legitimate. In this paper, we take the following steps to identif...
Anh Le, Athina Markopoulou, Michalis Faloutsos