-
1
-
-
24344479888
-
ETAP-3 Linguistic Processor: A Full-Fledged NPL Implementation of the Meaning-Text Theory
-
Paris, Ecole Normale Supérieure, June
-
Apresian, Ju. D. I.M. Boguslavsky, et al. ETAP-3 Linguistic Processor: a Full-Fledged NPL Implementation of the Meaning-Text Theory. Proc. First Int. Conf. Meaning-Text Theory, MTT 2003, Paris, Ecole Normale Supérieure, June 2003, p. 279-288.
-
(2003)
Proc. First Int. Conf. Meaning-Text Theory, MTT 2003
, pp. 279-288
-
-
Apresian Ju, D.1
Boguslavsky, I.M.2
-
2
-
-
77953750858
-
Natural Language Watermarking: Design, Analysis, and a Proof-of-concept Implementation
-
I.S. Moskowitz (Ed.) Springer
-
Atallah, M.J. V. Raskin, M. Crogan, C. F. Hempelmann, F. Kerschbaum, D. Mohamed, S. Naik. Natural Language Watermarking: Design, Analysis, and a Proof-of-concept Implementation. In: I.S. Moskowitz (Ed.) Information Hiding. Proc. Int. Workshop IH'2001. LNCS 2137, Springer, 2001, p. 185-199.
-
(2001)
Information Hiding. Proc. Int. Workshop IH'2001. LNCS 2137
, pp. 185-199
-
-
Atallah, M.J.1
Raskin, V.2
Crogan, M.3
Hempelmann, C.F.4
Kerschbaum, F.5
Mohamed, D.6
Naik, S.7
-
3
-
-
35248834521
-
Natural Language Watermarking and Tamperproofing
-
F.A.P. Peticolas. Springer
-
Atallah, M.J. V. Raskin, C.F. Hempelmann, M. Karahan, R. Sion, U. Topkara, K.E. Triezenberg. Natural Language Watermarking and Tamperproofing. In: F.A.P. Peticolas. Information Hiding. Proc. Int. Workshop IH'2002, LNCS 2578, Springer, 2003, p. 196-212.
-
(2003)
Information Hiding. Proc. Int. Workshop IH'2002, LNCS 2578
, pp. 196-212
-
-
Atallah, M.J.1
Raskin, V.2
Hempelmann, C.F.3
Karahan, M.4
Sion, R.5
Topkara, U.6
Triezenberg, K.E.7
-
5
-
-
33749677714
-
Getting One's First Million... Collocations
-
A. Gelbukh (Ed.). Febrary 2004, Seoul, Korea. LNCS 2945, Springer
-
Bolshakov, I.A. Getting One's First Million... Collocations. In: A. Gelbukh (Ed.). Computational Linguistics and Intelligent Text Processing. Proc. 5th Int. Conf. CICLing-2004, Febrary 2004, Seoul, Korea. LNCS 2945, Springer, 2004, p.229-242.
-
(2004)
Computational Linguistics and Intelligent Text Processing. Proc. 5th Int. Conf. CICLing-2004
, pp. 229-242
-
-
Bolshakov, I.A.1
-
7
-
-
84943246086
-
Heuristics-Based Replenishment of Collocation Databases
-
E. Ranchhold, N.J. Mamede (Eds.) PorTAL 2002, Faro, Portugal. LNAI2389, Springer
-
Bolshakov, I.A. A. Gelbukh. Heuristics-Based Replenishment of Collocation Databases. In: E. Ranchhold, N.J. Mamede (Eds.) Advances in Natural Language Processing. Proc. Int. Conf. PorTAL 2002, Faro, Portugal. LNAI2389, Springer, 2002, p. 25-32.
-
(2002)
Advances in Natural Language Processing. Proc. Int. Conf.
, pp. 25-32
-
-
Bolshakov, I.A.1
Gelbukh, A.2
-
8
-
-
9444264250
-
Stable Coordinated Pairs in Text Processing
-
V. MatouSek, P. Mautner (Eds.) České Budějovice, Czech Republic, September 2003. LNAI 2807, Springer
-
Bolshakov, I.A. A. Gelbukh, S.N. Galicia-Haro. Stable Coordinated Pairs in Text Processing. In: V. MatouSek, P. Mautner (Eds.) Text, Speech and Dialogue. Proc. 6th International Conference TSD 2003, České Budějovice, Czech Republic, September 2003. LNAI 2807, Springer, 2003, p. 27-34.
-
(2003)
Text, Speech and Dialogue. Proc. 6th International Conference TSD 2003
, pp. 27-34
-
-
Bolshakov, I.A.1
Gelbukh, A.2
Galicia-Haro, S.N.3
-
9
-
-
0005013984
-
Hiding the Hidden: A Software System for Concealing Ciphertext as Innocuous Text
-
Yongfei Han, Tatsuaki Okamoto, Sihan Qing (Eds.) Springer
-
Chapman, M. G.I. Davida. Hiding the Hidden: A Software System for Concealing Ciphertext as Innocuous Text. In: Yongfei Han, Tatsuaki Okamoto, Sihan Qing (Eds.) Proc. First Int. Conf. on Information and Communication Security ICICS 97. LNCS 1334, Springer, 1997, p. 335-345.
-
(1997)
Proc. First Int. Conf. on Information and Communication Security ICICS 97. LNCS 1334
, pp. 335-345
-
-
Chapman, M.1
Davida, G.I.2
-
10
-
-
84947255170
-
A Practical and Effective Approach to Large-Scale Automated Linguistic Steganography
-
G.I. Davida, Y. Frankel (Eds.) ICS 2001, LNCS 2200, Springer
-
Chapman, M. G.I. Davida, M. Rennhard. A Practical and Effective Approach to Large-Scale Automated Linguistic Steganography. In: G.I. Davida, Y. Frankel (Eds.) Information security. Proc. of Int. Conf. on Information and Communication Security ICS 2001, LNCS 2200, Springer, 2001, p. 156-165.
-
(2001)
Information Security. Proc. of Int. Conf. on Information and Communication Security
, pp. 156-165
-
-
Chapman, M.1
Davida, G.I.2
Rennhard, M.3
-
13
-
-
25744447980
-
-
Montreal/Paris, Les Presses de l'Université de Montréal/C.N.R.S.
-
Mel'čuk, I. Cours de morphologie général. Vol. 1, Montreal/Paris, Les Presses de l'Université de Montréal/C.N.R.S. 1993.
-
(1993)
Cours de Morphologie Général.
, vol.1
-
-
Mel'Čuk, I.1
-
14
-
-
3242685659
-
Phrasemes in Language and Phraseology in Linguistics
-
M. Everaert et al. (Eds.) Lawrence Erlbaum Associates Publ.
-
Mel'čuk, I. Phrasemes in Language and Phraseology in Linguistics. In: M. Everaert et al. (Eds.) Idioms: Structural and Psychological Perspectives. Lawrence Erlbaum Associates Publ. Hillsdale, NJ/Hove, UK, 1995, p. 169-252.
-
(1995)
Idioms: Structural and Psychological Perspectives.
, pp. 169-252
-
-
Mel'Čuk, I.1
-
15
-
-
35048823828
-
Linguistic Steganography Using SD-Form Semantics Model
-
Michiharu Niimi et al. Linguistic Steganography Using SD-Form Semantics Model. IPSJ Journal. Vol. 44, No. 08.
-
IPSJ Journal.
, vol.44
, pp. 8
-
-
Niimi, M.1
|