<--- Back to Details
First PageDocument Content
Computational linguistics / Information science / Artificial intelligence applications / Applied linguistics / Artificial intelligence / Natural language processing / Computer-assisted translation / Project management / Question answering / Machine translation / Deliverable / Evaluation
Date: 2016-05-03 11:49:22
Computational linguistics
Information science
Artificial intelligence applications
Applied linguistics
Artificial intelligence
Natural language processing
Computer-assisted translation
Project management
Question answering
Machine translation
Deliverable
Evaluation

quality translation by deep language engineering approaches

Add to Reading List

Source URL: www.di.fc.ul.pt

Download Document from Source Website

File Size: 850,06 KB

Share Document on Facebook

Similar Documents

Algebra / Linear algebra / Mathematics / Matrices / Numerical linear algebra / Unitary matrix / Matrix / Rotational symmetry / Four-vector / Permutation matrix / Eigenvalue perturbation / Singular value decomposition

CS378, MA375T, PHY341 Homework 1 Homework 1 Introduction to Quantum Information Science

DocID: 1xVZC - View Document

Algebra / Quantum mechanics / Physics / Quantum information science / Quantum states / Linear algebra / Quantum computing / 0I / Quantum circuit / Eigenvalues and eigenvectors / Qubit / Eigenvalue perturbation

CS378, MA375T, PHY341 Homework 2 Homework 2 Introduction to Quantum Information Science

DocID: 1xVYW - View Document

Health / Medicine / Global health / Epidemiology / Biological weapons / Tropical diseases / Zoonoses / Ebola virus disease / World Health Organization / Pandemic / Public health / Infection

GOV200X – The Politics of Plague Worcester Polytechnic Institute Social Science and Policy Studies Department Sample Syllabus Course Information Professor Patricia Stapleton

DocID: 1xVN2 - View Document

Computing / Free software / Dark web / Internet / Cryptographic protocols / Internet Standards / Computer network security / Tor / .onion / Botnet / Internet privacy / Bipartite graph

HOnions: Detection and Identification of Snooping Tor HSDirs Amirali Sanatinia, Guevara Noubir College of Computer and Information Science Northeastern University, Boston, USA {amirali,noubir}@ccs.neu.edu

DocID: 1xVHD - View Document

Security engineering / Cyberwarfare / Computing / Nadia Heninger / Transport Layer Security / Cryptography / E-commerce / Secure communication / Heninger / Alex Halderman / Association for Computing Machinery / DROWN attack

Shaanan N Cohney , https://cohney.info , Updated 16 September 2018 EDUCATION & WORK PhD Computer and Information Science Computer and Information Security

DocID: 1xVEY - View Document