Sciweavers

3639 search results - page 112 / 728
» Provenance as Dependency Analysis
Sort
View
MMB
2010
Springer
185views Communications» more  MMB 2010»
14 years 12 months ago
Reducing the Cost of Generating APH-Distributed Random Numbers
Phase-type (PH) distributions are proven to be very powerful tools in modelling and analysis of a wide range of phenomena in computer systems. The use of these distributions in sim...
Philipp Reinecke, Miklós Telek, Katinka Wol...
IJCAI
2007
14 years 11 months ago
A Labeling Approach to the Computation of Credulous Acceptance in Argumentation
In recent years, the combinatorics of argumentation with arguments that can attack each other has been studied extensively. Especially, attack graphs (put in the focus of attentio...
Bart Verheij
COLING
1996
14 years 11 months ago
Automatic Detection of Omissions in Translations
ADOMIT is an algorithln for Automatic Detection of OMissions in Translations. The algorithm relies solely on geometric analysis of bitext maps and uses no linguistic information. ...
I. Dan Melamed
ICASSP
2011
IEEE
14 years 1 months ago
cROVER: Improving ROVER using automatic error detection
Recognizer Output Voting Error Reduction (ROVER), is a well-known procedure for decoders’ combination aiming at reducing the Word Error Rate (WER) in transcription applications....
Kacem Abida, Fakhri Karray, Wafa Abida
ASPLOS
2010
ACM
15 years 1 months ago
Butterfly analysis: adapting dataflow analysis to dynamic parallel monitoring
Online program monitoring is an effective technique for detecting bugs and security attacks in running applications. Extending these tools to monitor parallel programs is challeng...
Michelle L. Goodstein, Evangelos Vlachos, Shimin C...