1 |
Robust and Efficient Anti-Phishing Techniques
|
|
|
|
In: DTIC (2012)
|
|
BASE
|
|
Show details
|
|
2 |
Fighting for Intelligence: The Design of Intelligence-Led Operations
|
|
|
|
In: DTIC (2008)
|
|
BASE
|
|
Show details
|
|
4 |
Effectively Using Syntax for Recognizing False Entailment
|
|
|
|
In: DTIC (2006)
|
|
BASE
|
|
Show details
|
|
5 |
Sparse Forward-Backward for Fast Training of Conditional Random Fields
|
|
|
|
In: DTIC (2006)
|
|
BASE
|
|
Show details
|
|
6 |
TREC2001 Question-Answer, Web and Cross Language Experiments Using PIRCS
|
|
|
|
In: DTIC (2006)
|
|
BASE
|
|
Show details
|
|
7 |
Intelligence Analyst Associate (IAA) - CYC Knowledge Extraction
|
|
|
|
In: DTIC AND NTIS (2003)
|
|
BASE
|
|
Show details
|
|
10 |
Evaluating Question-Answering Techniques in Chinese
|
|
|
|
In: DTIC (2001)
|
|
BASE
|
|
Show details
|
|
11 |
Optimal Allocation of Distributed Resources Using Fuzzy Logic and a Genetic Algorithm
|
|
|
|
In: DTIC (2000)
|
|
BASE
|
|
Show details
|
|
12 |
Efficient Algorithms for Speech Recognition.
|
|
|
|
In: DTIC AND NTIS (1996)
|
|
BASE
|
|
Show details
|
|
13 |
Situation, Domain, and Coherence: Toward a Pragmatic Psychology of Understanding.
|
|
|
|
In: DTIC AND NTIS (1996)
|
|
BASE
|
|
Show details
|
|
15 |
Semiautomatic Deabbreviation of Source Programs
|
|
|
|
In: DTIC AND NTIS (1994)
|
|
BASE
|
|
Show details
|
|
16 |
Using Multiple Adaptively-Weighted Strategies for the Resolution of Demonstratives
|
|
|
|
In: DTIC AND NTIS (1993)
|
|
BASE
|
|
Show details
|
|
17 |
SRI International: Description of the Tacitus System as Used for MUC-3
|
|
|
|
In: DTIC (1991)
|
|
BASE
|
|
Show details
|
|
19 |
The MIT Summit Speech Recognition System: A Progress Report
|
|
|
|
In: DTIC (1989)
|
|
BASE
|
|
Show details
|
|
20 |
A Model for Integrating a Job-Aiding, Training, and Performance Assessment System--a Preliminary Concept Paper.
|
|
|
|
In: DTIC AND NTIS (1988)
|
|
BASE
|
|
Show details
|
|
|
|