Sciweavers

6293 search results - page 1059 / 1259
» Information Flow Testing
Sort
View
PST
2008
15 years 5 months ago
Mimicry Attacks Demystified: What Can Attackers Do to Evade Detection?
Mimicry attacks have been the focus of detector research where the objective of the attacker is to generate an attack that evades detection while achieving the attacker's goa...
Hilmi Günes Kayacik, A. Nur Zincir-Heywood
NAACL
2007
15 years 5 months ago
Combining Outputs from Multiple Machine Translation Systems
Currently there are several approaches to machine translation (MT) based on different paradigms; e.g., phrasal, hierarchical and syntax-based. These three approaches yield similar...
Antti-Veikko I. Rosti, Necip Fazil Ayan, Bing Xian...
NIPS
2007
15 years 5 months ago
Discovering Weakly-Interacting Factors in a Complex Stochastic Process
Dynamic Bayesian networks are structured representations of stochastic processes. Despite their structure, exact inference in DBNs is generally intractable. One approach to approx...
Charlie Frogner, Avi Pfeffer
NIPS
2007
15 years 5 months ago
Bayesian Inference for Spiking Neuron Models with a Sparsity Prior
Generalized linear models are the most commonly used tools to describe the stimulus selectivity of sensory neurons. Here we present a Bayesian treatment of such models. Using the ...
Sebastian Gerwinn, Jakob Macke, Matthias Seeger, M...
RIAO
2007
15 years 5 months ago
Effectiveness of Rich Document Representation in XML Retrieval
Information Retrieval (IR) systems are built with different goals in mind. Some IR systems target high precision that is to have more relevant documents on the first page of their...
Fahimeh Raja, Mostafa Keikha, Maseud Rahgozar, Far...
« Prev « First page 1059 / 1259 Last » Next »