Sciweavers

1486 search results - page 141 / 298
» Firewall Rules Analysis
Sort
View
ACL
2003
15 years 5 months ago
A Syllable Based Word Recognition Model for Korean Noun Extraction
Noun extraction is very important for many NLP applications such as information retrieval, automatic text classification, and information extraction. Most of the previous Korean ...
Do-Gil Lee, Hae-Chang Rim, Heui-Seok Lim
IJCAI
2001
15 years 5 months ago
Achieving Budget-Balance with Vickrey-Based Payment Schemes in Exchanges
Generalized Vickrey mechanisms have received wide attention in the literature because they are efficient and strategyproof, i.e. truthful bidding is optimal whatever the bids of o...
David C. Parkes, Jayant Kalagnanam, Marta Eso
EACL
1989
ACL Anthology
15 years 5 months ago
A logical treatment of semi-free word order and bounded discontinuous constituency
In this paper we present a logical treatment of semifree word order and bounded discontinuous constituency. We extend standard feature value logics to treat word order in a single...
Mike Reape
ACL
1990
15 years 5 months ago
Mixed Initiative in Dialogue: An Investigation into Discourse Segmentation
Conversation between two people is usually of MIXED-INITIATIVE, with CONTROL over the conversation being transferred from one person to another. We apply a set of rules for the tr...
Marilyn A. Walker, Steve Whittaker
CORR
2010
Springer
135views Education» more  CORR 2010»
15 years 4 months ago
Fuzzy Aided Application Layer Semantic Intrusion Detection System - FASIDS
The objective of this is to develop a Fuzzy aided Application layer Semantic Intrusion Detection System (FASIDS) which works in the application layer of the network stack. FASIDS ...
S. Sangeetha, V. Vaidehi