Sciweavers

12981 search results - page 2279 / 2597
» Model Checking (Abstract)
Sort
View
IJCNLP
2005
Springer
15 years 10 months ago
Inversion Transduction Grammar Constraints for Mining Parallel Sentences from Quasi-Comparable Corpora
Abstract. We present a new implication of Wu’s (1997) Inversion Transduction Grammar (ITG) Hypothesis, on the problem of retrieving truly parallel sentence translations from larg...
Dekai Wu, Pascale Fung
IJCNLP
2005
Springer
15 years 10 months ago
Exploring Syntactic Relation Patterns for Question Answering
Abstract. In this paper, we explore the syntactic relation patterns for opendomain factoid question answering. We propose a pattern extraction method to extract the various relatio...
Dan Shen, Geert-Jan M. Kruijff, Dietrich Klakow
141
Voted
IMA
2005
Springer
126views Cryptology» more  IMA 2005»
15 years 10 months ago
Security Proof of Sakai-Kasahara's Identity-Based Encryption Scheme
Abstract. Identity-based encryption (IBE) is a special asymmetric encryption method where a public encryption key can be an arbitrary identifier and the corresponding private decr...
Liqun Chen, Zhaohui Cheng
IPOM
2005
Springer
15 years 10 months ago
Policy-Based Fault Management for Integrating IP over Optical Networks
Abstract. In this paper we present a policy-based architecture for aggregating (grooming) IP/MPLS flows (packet-based LSPs) within lightpaths taking into account the possibility o...
Cláudio Carvalho, Edmundo Roberto Mauro Mad...
IPSN
2005
Springer
15 years 10 months ago
Tracking on a graph
Abstract— This paper considers the problem of tracking objects with sparsely located binary sensors. Tracking with a sensor network is a challenging task due to the inaccuracy of...
Songhwai Oh, Shankar Sastry
« Prev « First page 2279 / 2597 Last » Next »