Open Access. Powered by Scholars. Published by Universities.®

Other Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 6 of 6

Full-Text Articles in Other Computer Engineering

Quantitative Fine-Grained Human Evaluation Of Machine Translation Systems: A Case Study On English To Croatian, Filip Klubicka, Antonio Toral, Victor Manuel Sanchez-Cartagena Jan 2018

Quantitative Fine-Grained Human Evaluation Of Machine Translation Systems: A Case Study On English To Croatian, Filip Klubicka, Antonio Toral, Victor Manuel Sanchez-Cartagena

Articles

This paper presents a quantitative fine-grained manual evaluation approach to comparing the performance of different machine translation (MT) systems. We build upon the well-established Multidimensional Quality Metrics (MQM) error taxonomy and implement a novel method that assesses whether the differences in performance for MQM error types between different MT systems are statistically significant. We conduct a case study for English-to- Croatian, a language direction that involves translating into a morphologically rich language, for which we compare three MT systems belonging to different paradigms: pure phrase-based, factored phrase-based and neural. First, we design an MQM-compliant error taxonomy tailored to the relevant ...


Adaptive Ofdm For Wireless Interconnect In Confined Enclosures, Vit Sipal, Javier Gelabert, Christopher J. Stevens, Ben Allen, David Edwards Jul 2013

Adaptive Ofdm For Wireless Interconnect In Confined Enclosures, Vit Sipal, Javier Gelabert, Christopher J. Stevens, Ben Allen, David Edwards

Articles

This letter considers and recommends OFDM with adaptive subcarrier modulation as a suitable candidate for wireless UWB communication in computer chassis. A rigorous measurement campaign studies the guaranteed spectral efficiency. It concludes that enhancement of the existing WiMedia OFDM systems with a bandwidth of 528 MHz in order to support adaptive OFDM would enable data-rates above 1 Gbps over short ranges, i.e. the spectral efficiency would be doubled. Moreover, the guaranteed spectral efficiency is shown to increase with bandwidth, i.e. the guaranteed data-rate increases better than linearly with bandwidth.


A Window Of Opportunity: Assessing Behavioural Scoring, Kenneth Kennedy, Brian Mac Namee, Sarah Jane Delany, Michael O'Sullivan, Neil Watson Jan 2013

A Window Of Opportunity: Assessing Behavioural Scoring, Kenneth Kennedy, Brian Mac Namee, Sarah Jane Delany, Michael O'Sullivan, Neil Watson

Articles

After credit has been granted, lenders use behavioural scoring to assess the likelihood of default occurring during some specific outcome period. This assessment is based on customers’ repayment performance over a given fixed period. Often the outcome period and fixed performance period are arbitrarily selected, causing instability in making predictions. Behavioural scoring has failed to receive the same attention from researchers as application scoring. The bias for application scoring research can be attributed, in part, to the large volume of data required for behavioural scoring studies. Furthermore, the commercial sensitivities associated with such a large pool of customer data often ...


Forty Years Of Movie Hacking: Considering The Potential Implications Of The Popular Media Representation Of Computer Hackers From 1968 To 2008, Damian Gordon Jan 2010

Forty Years Of Movie Hacking: Considering The Potential Implications Of The Popular Media Representation Of Computer Hackers From 1968 To 2008, Damian Gordon

Articles

Increasingly movies are being produced which feature plots that incorporate elements of computer security and hacking, and cumulatively these movies are creating a public perception as to the nature of computer security. This research examines movies that feature hackers (and hacking) to identify if any common themes emerge from these movies in their representation of these issues. To achieve this, first a corpus of hacking movies is created, and then using a qualitative data analysis technique, guidelines are developed which distinguish those movies that actually have the potential to create a perception with the general public. The resultant dataset is ...


Using Virtual Reality To Enhance Electrical Safety And Design In The Built Environment, Martin Barrett, Jonathan Blackledge, Eugene Coyle Jan 2010

Using Virtual Reality To Enhance Electrical Safety And Design In The Built Environment, Martin Barrett, Jonathan Blackledge, Eugene Coyle

Articles

Electricity and the inherent risks associated with its use in the built environment have long since been a priority for the electrical services industry and also the general public who must live and work in this environment. By its nature virtual reality has the advantage of being safe for both the user and equipment. In addition, it offers the user an opportunity to be exposed to a range of scenarios and conditions that either occur infrequently or are hazardous to replicate. This paper presents a prototype desktop virtual reality model, to enhance electrical safety and design in the built environment ...


A Case-Based Technique For Tracking Concept Drift In Spam Filtering, Sarah Jane Delany, Padraig Cunningham, Alexey Tsymbal, Lorcan Coyle Aug 2005

A Case-Based Technique For Tracking Concept Drift In Spam Filtering, Sarah Jane Delany, Padraig Cunningham, Alexey Tsymbal, Lorcan Coyle

Articles

Spam filtering is a particularly challenging machine learning task as the data distribution and concept being learned changes over time. It exhibits a particularly awkward form of concept drift as the change is driven by spammers wishing to circumvent spam filters. In this paper we show that lazy learning techniques are appropriate for such dynamically changing contexts. We present a case-based system for spam filtering that can learn dynamically. We evaluate its performance as the case-base is updated with new cases. We also explore the benefit of periodically redoing the feature selection process to bring new features into play. Our ...