Sciweavers

1486 search results - page 244 / 298
» Firewall Rules Analysis
Sort
View
GECCO
2005
Springer
139views Optimization» more  GECCO 2005»
15 years 5 months ago
Use of a genetic algorithm in brill's transformation-based part-of-speech tagger
The tagging problem in natural language processing is to find a way to label every word in a text as a particular part of speech, e.g., proper noun. An effective way of solving th...
Garnett Carl Wilson, Malcolm I. Heywood
ICIAR
2005
Springer
15 years 5 months ago
On the Individuality of the Iris Biometric
We consider quantitatively establishing the discriminative power of iris biometric data. It is difficult, however, to establish that any biometric modality is capable of distingui...
Sungsoo Yoon, Seung-Seok Choi, Sung-Hyuk Cha, Yill...
ISMIS
2005
Springer
15 years 5 months ago
Statistical Database Modeling for Privacy Preserving Database Generation
Abstract. Testing of database applications is of great importance. Although various studies have been conducted to investigate testing techniques for database design, relatively fe...
Xintao Wu, Yongge Wang, Yuliang Zheng
SEKE
2005
Springer
15 years 5 months ago
Face Alive Icons
Facial expression is one of the primary communication means of the human. However, realistic facial expression images are not used in popular communication tools on portable devic...
Xin Li, Chieh-Chih Chang, Shi-Kuo Chang
TLCA
2005
Springer
15 years 5 months ago
The Elimination of Nesting in SPCF
We use a fully abstract denotational model to show that nested function calls and recursive definitions can be eliminated from SPCF (a typed functional language with simple non-lo...
James Laird