Sciweavers

737 search results - page 106 / 148
» Network Structuring and Training Using Rule-Based Knowledge
Sort
View
LREC
2010
169views Education» more  LREC 2010»
14 years 11 months ago
Identification of the Question Focus: Combining Syntactic Analysis and Ontology-based Lookup through the User Interaction
Most question-answering systems contain a classifier module which determines a question category, based on which each question is assigned an answer type. However, setting up synt...
Danica Damljanovic, Milan Agatonovic, Hamish Cunni...
TSP
2010
14 years 4 months ago
Multichannel fast QR-decomposition algorithms: weight extraction method and its applications
Abstract--Multichannel fast QR decomposition RLS (MCFQRD-RLS) algorithms are well known for their good numerical properties and low computational complexity. The main limitation is...
Mobien Shoaib, Stefan Werner, José Antonio ...
65
Voted
ICDAR
2003
IEEE
15 years 3 months ago
Generation of Hierarchical Dictionary for Stroke-order Free Kanji Handwriting Recognition Based on Substroke HMM
This paper describes a method of generating a Kanji hierarchical structured dictionary for stroke-number and stroke-order free handwriting recognition based on substroke HMM. In s...
Mitsuru Nakai, Hiroshi Shimodaira, Shigeki Sagayam...
IEEEARES
2008
IEEE
15 years 4 months ago
Intensive Programme on Information and Communication Security
IT Security is a problem that can only be addressed and taught holistically. Just as broad as the field of ICT itself, IT Security is an integral part of all network and software ...
Christian Schläger, Ludwig Fuchs, Günthe...
87
Voted
RAID
2001
Springer
15 years 2 months ago
Accurately Detecting Source Code of Attacks That Increase Privilege
Host-based Intrusion Detection Systems (IDS) that rely on audit data exhibit a delay between attack execution and attack detection. A knowledgeable attacker can use this delay to d...
Robert K. Cunningham, Craig S. Stevenson