Sciweavers

7139 search results - page 1269 / 1428
» Language Engineering in Practice
Sort
View
OPODIS
2004
15 years 6 months ago
Firewall Queries
Firewalls are crucial elements in network security, and have been widely deployed in most businesses and institutions for securing private networks. The function of a firewall is t...
Alex X. Liu, Mohamed G. Gouda, Huibo H. Ma, Anne H...
ACL
1998
15 years 6 months ago
A Text Input Front-end Processor as an Information Access Platform
This paper presents a practical foreign language writing support tool which makes it much easier to utilize dictionary and example sentence resources. Like a Kana-Kanji conversion...
Shinichi Doi, Shin-ichiro Kamei, Kiyoshi Yamabana
ACL
2000
15 years 6 months ago
Specifying the Parameters of Centering Theory: a Corpus-Based Evaluation using Text from Application-Oriented Domains
The definitions of the basic concepts, rules, and constraints of centering theory involve underspecified notions such as `previous utterance', `realization', and `rankin...
Massimo Poesio, Hua Cheng, Renate Henschel, Janet ...
LFP
1992
140views more  LFP 1992»
15 years 5 months ago
Global Tagging Optimization by Type Inference
Tag handling accounts for a substantial amount of execution cost in latently typed languages such as Common LISP and Scheme, especially on architectures that provide no special ha...
Fritz Henglein
CCS
2010
ACM
15 years 4 months ago
TASTY: tool for automating secure two-party computations
Secure two-party computation allows two untrusting parties to jointly compute an arbitrary function on their respective private inputs while revealing no information beyond the ou...
Wilko Henecka, Stefan Kögl, Ahmad-Reza Sadegh...
« Prev « First page 1269 / 1428 Last » Next »