Sciweavers

268 search results - page 42 / 54
» Improving IBM Word Alignment Model 1
Sort
View
COMPSAC
2004
IEEE
15 years 7 months ago
Modular Design of Reactive Systems
: We concentrate on two major aspects of reactive system design: behavior control and modularity. These are studied from a formal point of view, within the framework of action syst...
Cristina Cerschi Seceleanu, Tiberiu Seceleanu
ICASSP
2011
IEEE
14 years 7 months ago
An iterative least-squares technique for dereverberation
Some recent dereverberation approaches that have been effective for automatic speech recognition (ASR) applications, model reverberation as a linear convolution operation in the s...
Kshitiz Kumar, Bhiksha Raj, Rita Singh, Richard M....
IWSEC
2007
Springer
15 years 10 months ago
A Secure Threshold Anonymous Password-Authenticated Key Exchange Protocol
At Indocrypt 2005, Viet et al., [22] have proposed an anonymous password-authenticated key exchange (PAKE) protocol and its threshold construction both of which are designed for cl...
SeongHan Shin, Kazukuni Kobara, Hideki Imai
ADHOC
2008
146views more  ADHOC 2008»
15 years 3 months ago
A secure group key management scheme for hierarchical mobile ad hoc networks
In this paper, we present a secure group key management scheme for hierarchical mobile ad-hoc networks. Our approach aims to improve both scalability and survivability of group ke...
Dijiang Huang, Deep Medhi
ACL
2006
15 years 5 months ago
Morphological Richness Offsets Resource Demand - Experiences in Constructing a POS Tagger for Hindi
In this paper we report our work on building a POS tagger for a morphologically rich language- Hindi. The theme of the research is to vindicate the stand that- if morphology is st...
Smriti Singh, Kuhoo Gupta, Manish Shrivastava, Pus...