Sciweavers

2748 search results - page 143 / 550
» Generating Object-Z Specifications from Use Cases
Sort
View
104
Voted
EMNLP
2008
15 years 2 months ago
Mining and Modeling Relations between Formal and Informal Chinese Phrases from Web Corpora
We present a novel method for discovering and modeling the relationship between informal Chinese expressions (including colloquialisms and instant-messaging slang) and their forma...
Zhifei Li, David Yarowsky
121
Voted
AUSDM
2008
Springer
224views Data Mining» more  AUSDM 2008»
15 years 2 months ago
Customer Event Rate Estimation Using Particle Filters
Estimating the rate at which events happen has been studied under various guises and in different settings. We are interested in the specific case of consumerinitiated events or t...
Harsha Honnappa
107
Voted
BMCBI
2006
138views more  BMCBI 2006»
15 years 18 days ago
Determination of strongly overlapping signaling activity from microarray data
Background: As numerous diseases involve errors in signal transduction, modern therapeutics often target proteins involved in cellular signaling. Interpretation of the activity of...
Ghislain Bidaut, Karsten Suhre, Jean-Michel Claver...
92
Voted
IROS
2006
IEEE
104views Robotics» more  IROS 2006»
15 years 6 months ago
Optimal Trajectory Generation for Manipulator Robots under Thermal Constraints
We propose here to deal with the optimization of velocity profiles of manipulator robots with a minimum time criterion subject to thermal constraints. This paper deals with the r...
Matthieu Guilbert, Pierre-Brice Wieber, Luc D. Jol...
121
Voted
SP
2002
IEEE
161views Security Privacy» more  SP 2002»
15 years 6 days ago
Improving Computer Security Using Extended Static Checking
We describe a method for finding security flaws in source code by way of static analysis. The method is notable because it allows a user to specify a wide range of security proper...
Brian Chess