Sciweavers

2038 search results - page 119 / 408
» Improvements to the Psi-SSA representation
Sort
View
COLING
2000
15 years 2 months ago
Exploiting a Probabilistic Hierarchical Model for Generation
Previous stochastic approaches to generation do not include a tree-based representation of syntax. While this may be adequate or even advantageous for some applications, other app...
Srinivas Bangalore, Owen Rambow

Publication
108views
15 years 3 months ago
A Compiler Generator Produced by a Self-Applicable Specializer Can Have a Surprisingly Natural and Understandable Structure
This paper describes the structure of, and the ideas behind, a self-applicable specializer of programs, as well as the principles of operation of a compiler generator that has been...
Sergei A. Romanenko
CORR
2010
Springer
148views Education» more  CORR 2010»
15 years 1 months ago
Techniques for Enhanced Physical-Layer Security
Information-theoretic security--widely accepted as the strictest notion of security--relies on channel coding techniques that exploit the inherent randomness of propagation channel...
Pedro C. Pinto, João Barros, Moe Z. Win
CORR
2007
Springer
105views Education» more  CORR 2007»
15 years 1 months ago
Finding low-weight polynomial multiples using discrete logarithm
— Finding low-weight multiples of a binary polynomial is a difficult problem arising in the context of stream ciphers cryptanalysis. The best algorithms to solve this problem ar...
Frédéric Didier, Yann Laigle-Chapuy
ML
2006
ACM
132views Machine Learning» more  ML 2006»
15 years 1 months ago
A suffix tree approach to anti-spam email filtering
We present an approach to email filtering based on the suffix tree data structure. A method for the scoring of emails using the suffix tree is developed and a number of scoring and...
Rajesh Pampapathi, Boris Mirkin, Mark Levene