Sciweavers

8479 search results - page 1549 / 1696
» Data Extraction from Web Data Sources
Sort
View
ASM
2008
ASM
15 years 5 months ago
Using EventB to Create a Virtual Machine Instruction Set Architecture
A Virtual Machine (VM) is a program running on a conventional microprocessor that emulates the binary instruction set, registers, and memory space of an idealized computing machine...
Stephen Wright
DSN
2008
IEEE
15 years 5 months ago
Convicting exploitable software vulnerabilities: An efficient input provenance based approach
Software vulnerabilities are the root cause of a wide range of attacks. Existing vulnerability scanning tools are able to produce a set of suspects. However, they often suffer fro...
Zhiqiang Lin, Xiangyu Zhang, Dongyan Xu
120
Voted
IMC
2007
ACM
15 years 5 months ago
On the impact of route monitor selection
Several route monitoring systems have been set up to help understand the Internet routing system. They operate by gathering realtime BGP updates from different networks. Many stud...
Ying Zhang, Zheng Zhang, Zhuoqing Morley Mao, Y. C...
94
Voted
ACL
2008
15 years 4 months ago
Measure Word Generation for English-Chinese SMT Systems
Measure words in Chinese are used to indicate the count of nouns. Conventional statistical machine translation (SMT) systems do not perform well on measure word generation due to ...
Dongdong Zhang, Mu Li, Nan Duan, Chi-Ho Li, Ming Z...
126
Voted
LREC
2010
179views Education» more  LREC 2010»
15 years 4 months ago
Evaluation Protocol and Tools for Question-Answering on Speech Transcripts
Question Answering (QA) technology aims at providing relevant answers to natural language questions. Most Question Answering research has focused on mining document collections co...
Nicolas Moreau, Olivier Hamon, Djamel Mostefa, Sop...
« Prev « First page 1549 / 1696 Last » Next »