Sciweavers

2006 search results - page 158 / 402
» Heuristic Security-Testing Methods
Sort
View
TSP
2008
99views more  TSP 2008»
15 years 22 days ago
Filter Design With Low Complexity Coefficients
We introduce a heuristic for designing filters that have low complexity coefficients, as measured by the total number of nonzeros digits in the binary or canonic signed digit (CSD)...
Joelle Skaf, Stephen P. Boyd
CORR
1998
Springer
98views Education» more  CORR 1998»
15 years 15 days ago
Statistical Models for Unsupervised Prepositional Phrase Attachment
We present several unsupervised statistical models for the prepositional phrase attachment task that approach the accuracy of the best supervised methods for this task. Our unsupe...
Adwait Ratnaparkhi
98
Voted
IJCGA
1998
97views more  IJCGA 1998»
15 years 15 days ago
Triangulation of Branching Contours Using Area Minimization
This paper presents a new method for reconstructing piecewise linear surfaces from planar polygonal contours that branch. For non-branching contours, experience has shown that the...
Mu Hong, Thomas W. Sederberg, Kris Klimaszewski, K...
98
Voted
NAACL
2010
14 years 10 months ago
Generalizing Syntactic Structures for Product Attribute Candidate Extraction
Noun phrases (NP) in a product review are always considered as the product attribute candidates in previous work. However, this method limits the recall of the product attribute e...
Yanyan Zhao, Bing Qin, Shen Hu, Ting Liu
MKM
2009
Springer
15 years 7 months ago
Combined Decision Techniques for the Existential Theory of the Reals
Methods for deciding quantifier-free non-linear arithmetical conjectures over R are crucial in the formal verification of many realworld systems and in formalised mathematics. Wh...
Grant Olney Passmore, Paul B. Jackson