-
1
-
-
0032637701
-
Copyright protection for the electronic distribution of text documents
-
July
-
J. T. Brassil, S. Low, and N. F. Maxemchuk, "Copyright protection for the electronic distribution of text documents," Proceedings of the IEEE, vol. 87, no. 1, pp. 1181- 1196, July 1999.
-
(1999)
Proceedings of the IEEE
, vol.87
, Issue.1
, pp. 1181-1196
-
-
Brassil, J.T.1
Low, S.2
Maxemchuk, N.F.3
-
5
-
-
0031362116
-
Secure spread spectrum watermarking for multimedia
-
December
-
I. J. Cox, J. Kilian, F. T. Leighton, and T. Shamoon, "Secure spread spectrum watermarking for multimedia," IEEE Transactions on Image Processing, vol. 6, no. 12, pp. 1673-1687, December 1997.
-
(1997)
IEEE Transactions on Image Processing
, vol.6
, Issue.12
, pp. 1673-1687
-
-
Cox, I.J.1
Kilian, J.2
Leighton, F.T.3
Shamoon, T.4
-
10
-
-
84920708072
-
Class-based construction of a verb lexicon
-
July 30 - August 3, Austin, TX
-
K. Kipper, H. T. Dang, and M. Palmer, "Class-based construction of a verb lexicon," AAAI-2000 Seventeenth National Conference on Artificial Intelligence, July 30 - August 3, 2000, Austin, TX.
-
(2000)
AAAI-2000 Seventeenth National Conference on Artificial Intelligence
-
-
Kipper, K.1
Dang, H.T.2
Palmer, M.3
-
12
-
-
0002487107
-
Word sense disambiguation: The current state of the art
-
N. Ide and J. Vronis, "Word sense disambiguation: The current state of the art," Computational Linguistics, vol. 24, no. 1, 1998.
-
(1998)
Computational Linguistics
, vol.24
, Issue.1
-
-
Ide, N.1
Vronis, J.2
-
13
-
-
14844326110
-
Natural language watermarking and tamperproofing
-
7-9 October Noordwijkerhout, The Netherlands
-
M. Atallah, V. Raskin, C. F. Hempelmann, M. Karahan, R. Sion, U. Topkara, and K. E. Triezenberg, "Natural language watermarking and tamperproofing," Proceedings of the Fifth Information Hiding Workshop, vol. LNCS 2578, 7-9 October 2002, Noordwijkerhout, The Netherlands.
-
(2002)
Proceedings of the Fifth Information Hiding Workshop
, vol.LNCS 2578
-
-
Atallah, M.1
Raskin, V.2
Hempelmann, C.F.3
Karahan, M.4
Sion, R.5
Topkara, U.6
Triezenberg, K.E.7
-
15
-
-
0347130613
-
Bilingual generation of weather forecasts in an operations environment
-
Helsinki, Finland
-
L. Bourbeau, D. Carcagno, E. Goldberg, R. Kittredge, and A. Polguère, "Bilingual generation of weather forecasts in an operations environment," Proceedings of the Thirteenth International Conference on Computational Linguistics, 1990, Helsinki, Finland, pp. 318-320.
-
(1990)
Proceedings of the Thirteenth International Conference on Computational Linguistics
, pp. 318-320
-
-
Bourbeau, L.1
Carcagno, D.2
Goldberg, E.3
Kittredge, R.4
Polguère, A.5
-
16
-
-
84860959534
-
-
"http://www.fb10.uni-bremen.de/anglistik/langpro/nlg-table/ nlg-table-root.htm."
-
-
-
-
17
-
-
85037066932
-
Learning to paraphrase: An unsupervised approach using multiple-sequence alignment
-
Edmonton, Canada
-
R. Barzilay and L. Lee, "Learning to paraphrase: An unsupervised approach using multiple-sequence alignment," Proceedings of NAACL Human Language Technology Conference, 2003, Edmonton, Canada.
-
(2003)
Proceedings of NAACL Human Language Technology Conference
-
-
Barzilay, R.1
Lee, L.2
-
18
-
-
85118725689
-
Syntax-based alignment of multiple translations: Extracting paraphrases and generating new sentences
-
Edmonton, Canada
-
B. Pang, K. Knight, and D. Marcu, "Syntax-based alignment of multiple translations: Extracting paraphrases and generating new sentences," Proceedings of NAACL Human Language Technology Conference, 2003, Edmonton, Canada.
-
(2003)
Proceedings of NAACL Human Language Technology Conference
-
-
Pang, B.1
Knight, K.2
Marcu, D.3
-
19
-
-
84950895792
-
Mimic functions
-
July
-
P. Wayner, "Mimic functions," CRYPTOLOGIA, vol. XVI, no. 3, pp. 193-214, July 1992.
-
(1992)
CRYPTOLOGIA
, vol.16
, Issue.3
, pp. 193-214
-
-
Wayner, P.1
-
20
-
-
84871230548
-
-
"The tyrannosaurus lex system available at http://www.fb10.uni- bremen.de/anglistik/langpro/nlgtable/nlg-table-root.htm."
-
The Tyrannosaurus Lex System
-
-
-
21
-
-
21844458120
-
Towards linguistic steganography: A systematic investigation of approaches, systems, and issues
-
University of Derby, August
-
R. Bergmair, "Towards linguistic steganography: A systematic investigation of approaches, systems, and issues.," tech. rep., University of Derby, August 2004.
-
(2004)
Tech. Rep.
-
-
Bergmair, R.1
-
22
-
-
0005013984
-
Hiding the hidden: A software system for concealing ciphertext in innocuous text
-
Beijing, China
-
M. Chapman and G. Davida, "Hiding the hidden: A software system for concealing ciphertext in innocuous text," Proceedings of the International Conference on Information and Communications Security, vol. LNCS 1334, 1997, Beijing, China.
-
(1997)
Proceedings of the International Conference on Information and Communications Security
, vol.LNCS 1334
-
-
Chapman, M.1
Davida, G.2
-
23
-
-
84944053897
-
Plausible deniability using automated linguistic stegonagraphy
-
October 1-3 Bristol, UK
-
M. Chapman and G. Davida, "Plausible deniability using automated linguistic stegonagraphy," roceedings of the International Conference on Infrastructure Security, October 1-3 2002, Bristol, UK, pp. 276-287.
-
(2002)
Roceedings of the International Conference on Infrastructure Security
, pp. 276-287
-
-
Chapman, M.1
Davida, G.2
-
24
-
-
0034593185
-
Natural language processing for information assurance and security: An overview and implementations
-
September, Cork, Ireland
-
M. Atallah, C. McDonough, S. Nirenburg, and V. Raskin, "Natural Language Processing for Information Assurance and Security: An Overview and Implementations," Proceedings 9th ACM/SIGSAC New Security Paradigms Workshop, September, 2000, Cork, Ireland, pp. 51-65.
-
(2000)
Proceedings 9th ACM/SIGSAC New Security Paradigms Workshop
, pp. 51-65
-
-
Atallah, M.1
McDonough, C.2
Nirenburg, S.3
Raskin, V.4
-
25
-
-
77953750858
-
Natural language watermarking: Design, analysis, and a proof-of-concept implementation
-
25-27 April Pittsburgh, PA
-
M. Atallah, V. Raskin, M. C. Crogan, C. F. Hempelmann, F. Kerschbaum, D. Mohamed, and S. Naik, "Natural language watermarking: Design, analysis, and a proof-of-concept implementation," Proceedings of the Fourth Information Hiding Workshop, vol. LNCS 2137, 25-27 April 2001, Pittsburgh, PA.
-
(2001)
Proceedings of the Fourth Information Hiding Workshop
, vol.LNCS 2137
-
-
Atallah, M.1
Raskin, V.2
Crogan, M.C.3
Hempelmann, C.F.4
Kerschbaum, F.5
Mohamed, D.6
Naik, S.7
-
27
-
-
85133336275
-
Bleu: A method for automatic evaluation of machine translation
-
July Philedelphia
-
K. Papineni, S. Roukos, T. Ward, and W. Zhu, "Bleu: a method for automatic evaluation of machine translation," Proceedings of 40th Annual Meeting of the ACL, July 2002, Philedelphia.
-
(2002)
Proceedings of 40th Annual Meeting of the ACL
-
-
Papineni, K.1
Roukos, S.2
Ward, T.3
Zhu, W.4
-
28
-
-
12744267262
-
Principles of context-based machine translation evaluation
-
E. Hovy, M. King, and A. Popescu-Belis, "Principles of context-based machine translation evaluation," Machine Translation, vol. 16, pp. 1-33, 2002.
-
(2002)
Machine Translation
, vol.16
, pp. 1-33
-
-
Hovy, E.1
King, M.2
Popescu-Belis, A.3
-
29
-
-
21844462057
-
Watermarking evaluation testbed (wet) at purdue university
-
January San Jose, CA.
-
H. C. Kim, H. Ogunleye, O. Guitart, and E. J. Delp, "Watermarking evaluation testbed (wet) at purdue university," Proceedings of the SPIE Conference on Security, Steganography, and Watermarking of Multimedia Contents VI, vol. SPIE 5306, 1822 January 2004, San Jose, CA.
-
(2004)
Proceedings of the SPIE Conference on Security, Steganography, and Watermarking of Multimedia Contents VI
, vol.SPIE 5306
, pp. 1822
-
-
Kim, H.C.1
Ogunleye, H.2
Guitart, O.3
Delp, E.J.4
|