Sciweavers

7811 search results - page 1338 / 1563
» computing 2004
Sort
View
100
Voted
ACL
2004
15 years 5 months ago
Finding Ideographic Representations of Japanese Names Written in Latin Script via Language Identification and Corpus Validation
Multilingual applications frequently involve dealing with proper names, but names are often missing in bilingual lexicons. This problem is exacerbated for applications involving t...
Yan Qu, Gregory Grefenstette
115
Voted
ACL
2004
15 years 5 months ago
Balancing Clarity and Efficiency in Typed Feature Logic Through Delaying
The purpose of this paper is to re-examine the balance between clarity and efficiency in HPSG design, with particular reference to the design decisions made in the English Resourc...
Gerald Penn
134
Voted
ACSW
2004
15 years 5 months ago
Cost-Efficient Mining Techniques for Data Streams
A data stream is a continuous and high-speed flow of data items. High speed refers to the phenomenon that the data rate is high relative to the computational power. The increasing...
Mohamed Medhat Gaber, Shonali Krishnaswamy, Arkady...
146
Voted
ACSW
2004
15 years 5 months ago
A Framework for Obfuscated Interpretation
Software protection via obscurity is now considered fundamental for securing software systems. This paper proposes a framework for obfuscating the program interpretation instead o...
Akito Monden, Antoine Monsifrot, Clark D. Thombors...
100
Voted
AIPS
2004
15 years 5 months ago
Guiding Planner Backjumping Using Verifier Traces
In this paper, we show how a planner can use a modelchecking verifier to guide state space search. In our work on hard real-time, closed-loop planning, we use a modelchecker'...
Robert P. Goldman, Michael J. S. Pelican, David J....
« Prev « First page 1338 / 1563 Last » Next »