Sciweavers

642 search results - page 47 / 129
» corr 2006
Sort
View
CORR
2006
Springer
114views Education» more  CORR 2006»
15 years 15 days ago
Dealing with Metonymic Readings of Named Entities
The aim of this paper is to propose a method for tagging named entities (NE), using natural language processing techniques. Beyond their literal meaning, named entities are freque...
Thierry Poibeau
97
Voted
CORR
2006
Springer
122views Education» more  CORR 2006»
15 years 15 days ago
The Capacity Region of a Class of Discrete Degraded Interference Channels
We provide a single-letter characterization for the capacity region of a class of discrete degraded interference channels (DDICs). The class of DDICs considered includes the discre...
Nan Liu, Sennur Ulukus
96
Voted
CORR
2006
Springer
69views Education» more  CORR 2006»
15 years 15 days ago
Bounds on the coefficients of the characteristic and minimal polynomials
ABSTRACT. This note presents absolute bounds on the size of the coefficients of the characteristic and minimal polynomials depending on the size of the coefficients of the associat...
Jean-Guillaume Dumas
66
Voted
CORR
2006
Springer
106views Education» more  CORR 2006»
15 years 15 days ago
Checkbochs: Use Hardware to Check Software
In this paper, we present a system called Checkbochs, a machine simulator that checks rules about its guest operating system and applications at the hardware level. The properties...
Sorav Bansal
CORR
2006
Springer
113views Education» more  CORR 2006»
15 years 15 days ago
Event Systems and Access Control
Abstract. We consider the interpretations of notions of access control (permissions, interdictions, obligations, and user rights) as run-time properties of information systems spec...
Dominique Méry, Stephan Merz