• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 3,440
Next 10 →

An Algorithm that Learns What's in a Name

by Daniel M. Bikel, Richard Schwartz, Ralph M. Weischedel , 1999
"... In this paper, we present IdentiFinder^TM, a hidden Markov model that learns to recognize and classify names, dates, times, and numerical quantities. We have evaluated the model in English (based on data from the Sixth and Seventh Message Understanding Conferences [MUC-6, MUC-7] and broadcast news) ..."
Abstract - Cited by 372 (7 self) - Add to MetaCart
In this paper, we present IdentiFinder^TM, a hidden Markov model that learns to recognize and classify names, dates, times, and numerical quantities. We have evaluated the model in English (based on data from the Sixth and Seventh Message Understanding Conferences [MUC-6, MUC-7] and broadcast news

Logtm: Log-based transactional memory

by Kevin E. Moore, Jayaram Bobba, Michelle J. Moravan, Mark D. Hill, David A. Wood - in HPCA , 2006
"... Transactional memory (TM) simplifies parallel programming by guaranteeing that transactions appear to execute atomically and in isolation. Implementing these properties includes providing data version management for the simultaneous storage of both new (visible if the transaction commits) and old (r ..."
Abstract - Cited by 282 (11 self) - Add to MetaCart
(retained if the transaction aborts) values. Most (hardware) TM systems leave old values “in place” (the target memory address) and buffer new values elsewhere until commit. This makes aborts fast, but penalizes (the much more frequent) commits. In this paper, we present a new implementation

Optimizing Java Bytecode using the Soot Framework: Is it Feasible?

by Raja Vallee-Rai, Etienne Gagnon, Laurie Hendren, Patrick Lam, Patrice Pominville, Vijay Sundaresan - In Proceedings of CC’00, International Conference on Compiler Construction (2000), Springer-Verlag (LNCS , 2000
"... . This paper presents Soot, a framework for optimizing Java TM bytecode. The framework is implemented in Java and supports three intermediate representations for representing Java bytecode: Baf, a streamlined representation of Java's stack-based bytecode; Jimple, a typed three-address inte ..."
Abstract - Cited by 140 (15 self) - Add to MetaCart
. This paper presents Soot, a framework for optimizing Java TM bytecode. The framework is implemented in Java and supports three intermediate representations for representing Java bytecode: Baf, a streamlined representation of Java's stack-based bytecode; Jimple, a typed three

A virtual human presenter

by Tsukasa Noma, Norman I. Badler - In Proceedings of the IJCAI’97 workshop on Animated Interface Agents - Making them Intelligent , 1997
"... A virtual human presenter is created based on extensions to the Jack TM animated agent system. Inputs to the presenter system are in the form of speech texts with embedded commands, most of which relate to the virtual presenter's body language. The system then makes him act as a presenter with ..."
Abstract - Cited by 94 (12 self) - Add to MetaCart
A virtual human presenter is created based on extensions to the Jack TM animated agent system. Inputs to the presenter system are in the form of speech texts with embedded commands, most of which relate to the virtual presenter's body language. The system then makes him act as a presenter

Datalog with Constraints: A Foundation for Trust Management Languages

by Ninghui Li, John C. Mitchell - In PADL ’03: Proceedings of the 5th International Symposium on Practical Aspects of Declarative Languages , 2003
"... Trust management (TM) is a promising approach for authorization and access control in distributed systems, based on signed distributed policy statements expressed in a policy language. Although several TM languages are semantically equivalent to subsets of Datalog, Datalog is not su#ciently expr ..."
Abstract - Cited by 121 (11 self) - Add to MetaCart
into this class. We also present a concrete declarative TM language, RT 1 , based on constraint Datalog, and use constraint Datalog to analyze another TM system, KeyNote, which turns out to be less expressive than RT 1 in significant respects, yet less tractable in the worst case. Although constraint

A flexible framework for implementing software transactional memory

by Maurice Herlihy, Victor Luchangco, Mark Moir - In ACM Conference on Object-Oriented Programming, Systems, Languages, and Applications , 2006
"... We describe DSTM2, a Java TM software library that provides a flexible framework for implementing object-based software transactional memory (STM). The library uses transactional factories to transform sequential (unsynchronized) classes into atomic (transactionally synchronized) ones, providing a s ..."
Abstract - Cited by 132 (5 self) - Add to MetaCart
We describe DSTM2, a Java TM software library that provides a flexible framework for implementing object-based software transactional memory (STM). The library uses transactional factories to transform sequential (unsynchronized) classes into atomic (transactionally synchronized) ones, providing a

InfiniteReality: A Real-Time Graphics System

by John S. Montrym, Daniel R. Baum, David L. Dignam, Christopher J. Migdal - In Proceedings of SIGGRAPH ’97 , 1997
"... The InfiniteReality TM graphics system is the first general-purpose workstation system specifically designed to deliver 60Hz steady frame rate high-quality rendering of complex scenes. This paper describes the InfiniteReality system architecture and presents novel features designed to handle extreme ..."
Abstract - Cited by 121 (0 self) - Add to MetaCart
The InfiniteReality TM graphics system is the first general-purpose workstation system specifically designed to deliver 60Hz steady frame rate high-quality rendering of complex scenes. This paper describes the InfiniteReality system architecture and presents novel features designed to handle

Multiresolution-based image fusion with additive wavelet decomposition

by Xavier Otazu, Octavi Fors, Albert Prades - IEEE Transactions on Geoscience and Remote Sensing , 1999
"... Abstract — The standard data fusion methods may not be satisfactory to merge a high-resolution panchromatic image and a low-resolution multispectral image because they can distort the spectral characteristics of the multispectral data. In this paper, we developed a technique, based on multiresolutio ..."
Abstract - Cited by 124 (2 self) - Add to MetaCart
” algorithm which allows to use a dyadic wavelet to merge nondyadic data in a simple and efficient scheme. We used the method to merge SPOT and LANDSAT (TM) images. The technique presented is clearly better than the IHS and LHS mergers in preserving both spectral and spatial information. I.

blue-c: A Spatially Immersive Display and 3D Video Portal for Telepresence

by Markus Gross, Stephan Würmlin, Martin Naef, Edouard Lamboray, Christian Spagno, Andreas Kunz, Esther Koller-meier, Tomas Svoboda, Luc Van Gool, Silke Lang, Kai Strehlke, Andrew Vande Moere, Oliver, Eth Zürich, Oliver Staadt - ACM Transactions on Graphics , 2003
"... We present blue-c, a new immersive projection and 3D video acquisition environment for virtual design and collaboration. It combines simultaneous acquisition of multiple live video streams with advanced 3D projection technology in a CAVE^TM-like environment, creating the impression of total immersio ..."
Abstract - Cited by 124 (19 self) - Add to MetaCart
We present blue-c, a new immersive projection and 3D video acquisition environment for virtual design and collaboration. It combines simultaneous acquisition of multiple live video streams with advanced 3D projection technology in a CAVE^TM-like environment, creating the impression of total

Secure and selective dissemination of xml documents

by Elisa Bertino, Elena Ferrari - ACM Transactions on Information and System Security , 2002
"... XML (eXtensible Markup Language) has emerged as a prevalent standard for document representation and exchange on the Web. It is often the case that XML documents contain information of different sensitivity degrees that must be selectively shared by (possibly large) user communities. There is thus t ..."
Abstract - Cited by 121 (14 self) - Add to MetaCart
an approach, based on an extension of the CryptolopeTM approach [Gladney and Lotspiech 1997], which essentially allows one to send the same document to all users, and yet to enforce the stated access control policies. Our approach consists of encrypting different portions of the same document according
Next 10 →
Results 1 - 10 of 3,440
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University