Sciweavers

1360 search results - page 235 / 272
» Risk Analysis with Information Described in Natural Language
Sort
View
TSE
2008
128views more  TSE 2008»
14 years 9 months ago
Analyzing Regulatory Rules for Privacy and Security Requirements
Information practices that use personal, financial, and health-related information are governed by US laws and regulations to prevent unauthorized use and disclosure. To ensure com...
Travis D. Breaux, Annie I. Antón
ICMCS
1999
IEEE
234views Multimedia» more  ICMCS 1999»
15 years 2 months ago
Spatiotemporal Segmentation and Tracking of Objects for Visualization of Videoconference Image Sequences
Abstract--In this paper, a procedure is described for the segmentation, content-based coding, and visualization of videoconference image sequences. First, image sequence analysis i...
Ioannis Kompatsiaris, Michael G. Strintzis
ADVAI
2010
110views more  ADVAI 2010»
14 years 4 months ago
Using Genetic Algorithms to Represent Higher-Level Planning in Simulation Models of Conflict
The focus of warfare has shifted from the Industrial Age to the Information Age, as encapsulated by the term Network Enabled Capability. This emphasises information sharing, comma...
James Moffat, Susan Fellows
EACL
2003
ACL Anthology
14 years 11 months ago
Cohesion and coherence for Automatic Summarization
This paper presents the integration of cohesive properties of text with coherence relations, to obtain an adequate representation of text for automatic summarization. A summarizer...
Laura Alonso Alemany, María Fuentes Fort
COLING
1992
14 years 11 months ago
A Freely Available Wide Coverage Morphological Analyzer for English
This paper presents a morphological lexicon for English that handle more than 317000 inflected forms derived from over 90000 stems. The lexicon is available in two formats. The fi...
Daniel Karp, Yves Schabes, Martin Zaidel, Dania Eg...