Sciweavers

3555 search results - page 527 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
COLING
2002
15 years 3 months ago
Applying an NVEF Word-Pair Identifier to the Chinese Syllable-to-Word Conversion Problem
Syllable-to-word (STW) conversion is important in Chinese phonetic input methods and speech recognition. There are two major problems in the STW conversion: (1) resolving the ambi...
Jia-Lin Tsai, Wen-Lian Hsu
168
Voted
SIGIR
2012
ACM
13 years 6 months ago
Explanatory semantic relatedness and explicit spatialization for exploratory search
Exploratory search, in which a user investigates complex concepts, is cumbersome with today’s search engines. We present a new exploratory search approach that generates interac...
Brent Hecht, Samuel Carton, Mahmood Quaderi, Johan...
COMPSAC
2005
IEEE
15 years 9 months ago
Detecting Intrusions Specified in a Software Specification Language
To protect software against malicious activities, organizations are required to monitor security breaches. Intrusion Detection Systems (IDS) are those kinds of monitoring tools th...
Mohammad Feroz Raihan, Mohammad Zulkernine
118
Voted
UIST
1994
ACM
15 years 8 months ago
An Architecture for Transforming Graphical Interfaces
While graphical user interfaces have gained much popularity in recent years, there are situations when the need to use existing applications in a nonvisual modality is clear. Exam...
W. Keith Edwards, Elizabeth D. Mynatt
CCE
2007
15 years 4 months ago
Adaptive optimisation of noisy black-box functions inherent in microscopic models
For systems where exact constitutive relations are unknown, a microscopic level description can be alternatively used. As microscopic simulations are computationally expensive, th...
Eddie Davis, Marianthi G. Ierapetritou