Sciweavers

1999 search results - page 168 / 400
» Finding Reductions Automatically
Sort
View
LISA
2007
15 years 16 days ago
ATLANTIDES: An Architecture for Alert Verification in Network Intrusion Detection Systems
We present an architecture1 designed for alert verification (i.e., to reduce false positives) in network intrusion-detection systems. Our technique is based on a systematic (and a...
Damiano Bolzoni, Bruno Crispo, Sandro Etalle
CASES
2005
ACM
15 years 5 days ago
Intra-task scenario-aware voltage scheduling
Modern embedded applications usually have real-time constraints and they have requirements for low energy consumption. At system level, intra-task dynamic voltage scaling (DVS) is...
Stefan Valentin Gheorghita, Twan Basten, Henk Corp...
98
Voted
ACL
2007
14 years 11 months ago
SVM Model Tampering and Anchored Learning: A Case Study in Hebrew NP Chunking
We study the issue of porting a known NLP method to a language with little existing NLP resources, specifically Hebrew SVM-based chunking. We introduce two SVM-based methods – ...
Yoav Goldberg, Michael Elhadad
MVA
2007
120views Computer Vision» more  MVA 2007»
14 years 11 months ago
Improvement of Cadastral Map Assembling Based on GHT
There are numerous cadastral maps generated by past land surveying. For effective and efficient use of these maps, we have to assemble the set of maps to make them superimposable ...
Fei Liu, Wataru Ohyama, Tetsushi Wakabayashi, Fumi...
111
Voted
ACL
2004
14 years 11 months ago
Discriminative Language Modeling with Conditional Random Fields and the Perceptron Algorithm
This paper describes discriminative language modeling for a large vocabulary speech recognition task. We contrast two parameter estimation methods: the perceptron algorithm, and a...
Brian Roark, Murat Saraclar, Michael Collins, Mark...