Sciweavers

3771 search results - page 149 / 755
» Subobject Transformation Systems
Sort
View
158
Voted
NAACL
2010
15 years 1 months ago
Good Question! Statistical Ranking for Question Generation
We address the challenge of automatically generating questions from reading materials for educational practice and assessment. Our approach is to overgenerate questions, then rank...
Michael Heilman, Noah A. Smith
159
Voted
FOSSACS
2012
Springer
13 years 11 months ago
A Coalgebraic Perspective on Minimization and Determinization
Coalgebra offers a unified theory of state based systems, including infinite streams, labelled transition systems and deterministic automata. In this paper, we use the coalgebrai...
Jirí Adámek, Filippo Bonchi, Mathias...
ICPR
2008
IEEE
16 years 4 months ago
On using error bounds to optimize cost-sensitive multimodal biometric authentication
While using more biometric traits in multimodal biometric fusion can effectively increase the system robustness, often, the cost associated to adding additional systems is not con...
Norman Poh, Josef Kittler
132
Voted
SP
2007
IEEE
157views Security Privacy» more  SP 2007»
15 years 9 months ago
Network Flow Watermarking Attack on Low-Latency Anonymous Communication Systems
Many proposed low-latency anonymous communication systems have used various flow transformations such as traffic padding, adding cover traffic (or bogus packets), packet droppi...
Xinyuan Wang, Shiping Chen, Sushil Jajodia
DAGSTUHL
2004
15 years 4 months ago
Refinement and Consistency in Multiview Models
Abstract. Model transformations are an integral part of OMG's standard for Model Driven Architecture (MDA). Model transformations should at the best allow for a seamless trans...
Heike Wehrheim