Sciweavers

662 search results - page 112 / 133
» IPSec: Performance Analysis and Enhancements
Sort
View
CLIN
2001
14 years 11 months ago
Memory-Based Phoneme-to-Grapheme Conversion
In this paper, we describe a method to enhance the readability of out-of-vocabulary items (OOVs) in the textual output in a large vocabulary continuous speech recognition system. ...
Bart Decadt, Jacques Duchateau, Walter Daelemans, ...
ENTCS
2007
126views more  ENTCS 2007»
14 years 9 months ago
Context Dependent Procedures and Computed Types in -eriFun
We present two enhancements of the functional language L which is used in the eriFun system to write programs and formulate statements about them. Context dependent procedures all...
Andreas Schlosser, Christoph Walther, Michael Gond...
VIS
2007
IEEE
162views Visualization» more  VIS 2007»
15 years 11 months ago
Segmentation of Three-dimensional Retinal Image Data
We have combined methods from volume visualization and data analysis to support better diagnosis and treatment of human retinal diseases. Many diseases can be identified by abnorma...
Alfred R. Fuller, Rober t J. Zawadzki, Stacey Ch...
SIGSOFT
2006
ACM
15 years 10 months ago
Questions programmers ask during software evolution tasks
Though many tools are available to help programmers working on change tasks, and several studies have been conducted to understand how programmers comprehend systems, little is kn...
Jonathan Sillito, Gail C. Murphy, Kris De Volder
ACMSE
2006
ACM
14 years 11 months ago
Phoenix-based clone detection using suffix trees
A code clone represents a sequence of statements that are duplicated in multiple locations of a program. Clones often arise in source code as a result of multiple cut/paste operat...
Robert Tairas, Jeff Gray