With ubiquitous computing system, users can access information through a computer network at any time and in any place. The basic infrastructure of ubiquitous computing system is wireless network environment, and a RF...
详细信息
We give an overview of the RWTH phrase-based statistical machine translation system that was used in the evaluation campaign of the International Workshop on Spoken language Translation (IWSLT) 2006. The system was ra...
详细信息
Word posterior probabilities are a common approach for confidence estimation in automatic speech recognition and machine translation. We will generalize this idea and introduce n-gram posterior probabilities and show ...
详细信息
We present discriminative reordering models for phrase-based statistical machine translation. The models are trained using the maximum entropy principle. We use several types of features: based on words, based on word...
详细信息
We present twin results on Chinese semantic parsing, with application to English-Chinese cross- lingual verb frame acquisition. First, we describe two new state-of-the-art Chinese shallow semantic parsers leading to a...
详细信息
We present twin results on Chinese semantic parsing, with application to English-Chinese cross- lingual verb frame acquisition. First, we describe two new state-of-the-art Chinese shallow semantic parsers leading to an F-score of 82.01 on simultaneous frame and argument boundary identification and labeling. Subsequently, we propose a model that applies the separate Chinese and English semantic parsers to learn cross-lingual semantic verb frame argument mappings with 89.3% accuracy. The only training data needed by this cross-lingual learning model is a pair of non-parallel monolingual Propbanks, plus an unannotated parallel corpus. We also present the first reported controlled comparison of maximum entropy and SVM approaches to shallow semantic parsing, using the Chinese data.
We present the first known direct measurement of word alignment coverage on an Arabic-English parallel corpus using inversion transduction grammar constraints. While direct measurements have been reported for several ...
详细信息
We present the first known direct measurement of word alignment coverage on an Arabic-English parallel corpus using inversion transduction grammar constraints. While direct measurements have been reported for several European and Asian languages, to date no results have been available for Arabic or any Semitic language despite much recent activity on Arabic- English spoken language and text translation. Many recent syntax based statistical MT models operate within the domain of ITG expressiveness, often for efficiency reasons, so it has become important to determine the extent to which the ITG constraint assumption holds. Our results on Arabic provide further evidence that ITG expressiveness appears largely sufficient for core MT models.
This paper presents a novel relative mobility metric for MANETs. There have been many researches on providing mobility under mobile/wireless environment. However, previous researches had several problem as disruption ...
详细信息
This paper presents a novel relative mobility metric for MANETs. There have been many researches on providing mobility under mobile/wireless environment. However, previous researches had several problem as disruption and unnecessary traffic. Disruption happens when messages are exchanged between nodes as registration is made after handoff, and unnecessary traffic occurs because of the use of random-move model, in which the probability for node to move to the neighboring clusters is equal. In order to solve these problems, this study proposes a technique and algorithm for composing direction shadow registration (DSR) that provides seamless mobility. We are introduced a cluster division scheme and decided minimal DSR. DSR can sensed the optimal time for handoff through regional cluster division and applied direction vector (DV) obtained through directional cluster sectoring. According to the result of the experiment, the proposed DSR processes message exchange between nodes within the intracluster, the frequency of disruptions decreased significantly compared to that in previous researches held in interdomain environment. In addition, traffic that occurs at every handoff happened twice in DSR compared to n (the number of neighboring clusters) times in previous researches
In this paper, we describe a secure cluster-routing protocol based on clustering scheme in ad hoc networks. This work provides scalable, threshold authentication scheme in ad hoc networks. We present detailed security...
详细信息
In this paper, we describe a package delivery problem and propose a method based on the extended simulated annealing(ESA) algorithm which is able to find an optimal routing path for efficient package delivery service....
详细信息
In this paper, we describe a package delivery problem and propose a method based on the extended simulated annealing(ESA) algorithm which is able to find an optimal routing path for efficient package delivery service. The problem domain that we solve is modeled as a weighted, directed graph.
The proper elicitation and specification of functional and non-functional requirements of an information system in a given environment is the first and the most critical task for the software developers today. The nex...
详细信息
The proper elicitation and specification of functional and non-functional requirements of an information system in a given environment is the first and the most critical task for the software developers today. The next critical activity is to properly understand these requirements so as to map them on to various design artifacts. In this paper, with the help of the requirements model, we present the behaviour part in the specification of requirements. We explain the behaviour in the specification with the help of dependencies using a mathematical model and a tree/graph so as to enhance the complete understanding of the requirements specification of the information system.
暂无评论