Sciweavers

268 search results - page 42 / 54
» Improving IBM Word Alignment Model 1
Sort
View
COMPSAC
2004
IEEE
15 years 3 months ago
Modular Design of Reactive Systems
: We concentrate on two major aspects of reactive system design: behavior control and modularity. These are studied from a formal point of view, within the framework of action syst...
Cristina Cerschi Seceleanu, Tiberiu Seceleanu
ICASSP
2011
IEEE
14 years 3 months ago
An iterative least-squares technique for dereverberation
Some recent dereverberation approaches that have been effective for automatic speech recognition (ASR) applications, model reverberation as a linear convolution operation in the s...
Kshitiz Kumar, Bhiksha Raj, Rita Singh, Richard M....
90
Voted
IWSEC
2007
Springer
15 years 5 months ago
A Secure Threshold Anonymous Password-Authenticated Key Exchange Protocol
At Indocrypt 2005, Viet et al., [22] have proposed an anonymous password-authenticated key exchange (PAKE) protocol and its threshold construction both of which are designed for cl...
SeongHan Shin, Kazukuni Kobara, Hideki Imai
ADHOC
2008
146views more  ADHOC 2008»
14 years 12 months ago
A secure group key management scheme for hierarchical mobile ad hoc networks
In this paper, we present a secure group key management scheme for hierarchical mobile ad-hoc networks. Our approach aims to improve both scalability and survivability of group ke...
Dijiang Huang, Deep Medhi
ACL
2006
15 years 1 months ago
Morphological Richness Offsets Resource Demand - Experiences in Constructing a POS Tagger for Hindi
In this paper we report our work on building a POS tagger for a morphologically rich language- Hindi. The theme of the research is to vindicate the stand that- if morphology is st...
Smriti Singh, Kuhoo Gupta, Manish Shrivastava, Pus...