Sciweavers

755 search results - page 53 / 151
» ideas 2005
Sort
View
IH
2005
Springer
15 years 3 months ago
Self-validating Branch-Based Software Watermarking
Software protection is an area of active research in which a variety of techniques have been developed to address the issue. Examples of such techniques are software watermarking, ...
Ginger Myles, Hongxia Jin
IJCNLP
2005
Springer
15 years 3 months ago
A Machine Learning Approach to Sentence Ordering for Multidocument Summarization and Its Evaluation
Ordering information is a difficult but a important task for natural language generation applications. A wrong order of information not only makes it difficult to understand, but a...
Danushka Bollegala, Naoaki Okazaki, Mitsuru Ishizu...
IJCNLP
2005
Springer
15 years 3 months ago
Topic Tracking Based on Linguistic Features
This paper explores two linguistically motivated restrictions on the set of words used for topic tracking on newspaper articles: named entities and headline words. We assume that n...
Fumiyo Fukumoto, Yusuke Yamaji
ISI
2005
Springer
15 years 3 months ago
Link Analysis Tools for Intelligence and Counterterrorism
Association rule mining is an important data analysis tool that can be applied with success to a variety of domains. However, most association rule mining algorithms seek to discov...
Antonio Badia, Mehmed M. Kantardzic
ISI
2005
Springer
15 years 3 months ago
Selective Fusion for Speaker Verification in Surveillance
This paper presents an improved speaker verification technique that is especially appropriate for surveillance scenarios. The main idea is a metalearning scheme aimed at improving ...
Yosef A. Solewicz, Moshe Koppel