Sciweavers

1954 search results - page 277 / 391
» Improving Software Development Processes with Multicriteria ...
Sort
View
SIGSOFT
2007
ACM
15 years 10 months ago
SLEDE: lightweight verification of sensor network security protocol implementations
Finding flaws in security protocol implementations is hard. Finding flaws in the implementations of sensor network security protocols is even harder because they are designed to p...
Youssef Hanna
KONVENS
2000
15 years 1 months ago
The RWTH Large Vocabulary Speech Recognition System for Spontaneous Speech
This paper presents details of the RWTH large vocabulary continuous speech recognition system used in the VERBMOBIL spontaneous speech translation system. In particular, we report...
Stephan Kanthak, Sirko Molau, Achim Sixtus, Ralf S...
ICMCS
2010
IEEE
198views Multimedia» more  ICMCS 2010»
14 years 11 months ago
Naming persons in news video with label propagation
Labeling persons appearing in video frames with names detected from the video transcript helps improving the video content identification and search task. We develop a face naming...
Phi The Pham, Marie-Francine Moens, Tinne Tuytelaa...
EMNLP
2010
14 years 8 months ago
Practical Linguistic Steganography Using Contextual Synonym Substitution and Vertex Colour Coding
Linguistic Steganography is concerned with hiding information in natural language text. One of the major transformations used in Linguistic Steganography is synonym substitution. ...
Ching-Yun Chang, Stephen Clark
PROMISE
2010
14 years 4 months ago
Exploiting count spectra for Bayesian fault localization
Background: Automated diagnosis of software defects can drastically increase debugging efficiency, improving reliability and time-to-market. Current, low-cost, automatic fault dia...
Rui Abreu, Alberto González-Sanchez, Arjan ...