Skip to main content
MITRE logo
Search the site
  • Home
  • Who We Are
    • Who We Are
    • Our Story
    • Our People
  • Our Impact
    • Our Impact
    • R&D Centers
    • MITRE Labs
    • Independent Research
    • Policy and Thought Leadership
    • Intellectual Property
    • Partnerships
    • Publications
  • Focus Areas
    • Focus Areas
    • Aerospace
    • Artificial Intelligence
    • Cybersecurity
    • Defense & Intelligence
    • Government Innovation
    • Health
    • Homeland Security
    • Telecom
    • Transportation
  • News & Insights
  • Careers
  • Contact Us
  • Events
  • Locations
Subscribe to our newsletter

Toolkit menu

MITRE logo
  • Home
  • Search

Search

Site Search

0 Results for: CONTACT colaplug.com TO BUY COCAINE ONLINE IN Tourcoing

Enter a keyword to search our website. Or, see News & Insights for our latest stories, publications, news releases, and more.


 

1799

Dropped Personal Pronoun Recovery in Chinese SMS

Publication
July 20, 2016
… reserved. 2 Figure 1, below, and the task of relation detection. The message expresses a contact relation between John and the author of the message. A common approach to relation … relations to be detected across sentences. However, such an approach will fail to detect the contact relationship in Figure 1 without first recovering “I”. John went to school today. Met him …

Creating the Future of Aerospace and Transportation: Technical and Professional Activities 2018

Publication
April 01, 2019
… Activities 2018 An annual compendium of technical and professional accomplishments in aerospace and transportation from MITRE’s Center for Advanced Aviation System Development. … publication is the nineteenth annual compendium of technical and professional accomplishments in aerospace and transportation from MITRE’s Center for Advanced Aviation System Development … MITRE’s nineteenth annual compendium of our staff ’s technical and professional activities in aerospace and transportation. This booklet highlights the expertise, capabilities, and …

Midway Revisited: Detecting Deception by Analysis of Competing Hypothesis

Publication
July 04, 2004
… that a deceiver must hide and a counterdeceiver must uncover, (2) isolate local deception in intelligence reporting and sensing from global deception, and (3) identify circumstances when it might be fruitful to entertain additional hypotheses. We illustrate this model by describing how it could have been used by the Japanese Navy before the Battle of Midway to detect the American denial and deception tactics that allowed the U.S. Pacific Fleet aircraft …

State of the Research in Human Language Technology: A Study of ACL and NAACL Publications from 2007 through 2014

Publication
March 10, 2015
… State of the Research in Human Language Technology: A Study of ACL and NAACL Publications from 2007 through 2014 Karine Megerdoomian he goal of this study is to identify state-of-the-art in human language technology (HLT) for the application areas of … foundational technology, pinpointing potential research directions. The goal of this study is to identify state-of-the-art in human language technology (HLT) for the application areas of …

A Monte Carlo Simulation for Evaluating Airborne Collision Risk in Intersecting Runways

Publication
August 14, 2013
… A Monte Carlo Simulation for Evaluating Airborne Collision Risk in Intersecting Runways Michael Henry Samuel Schmitz Kevin Kelbaugh Nikita Revenko An analyst may use MITRE's Intersecting Operations simulation model to develop a strategy that mitigates unacceptable risk by ensuring that aircraft avoid situations more likely to result in a midair collision ​The Intersecting Operations simulation model was developed to …

AI Assurance: A Repeatable Process for Assuring AI-enabled Systems

Publication
June 05, 2024
… PROCESS FOR ASSURING AI-ENABLED SYSTEMS JUNE 2024 SC3. An assurance risk assessment that com- prehensively identifes and estimates hazards and risks. Components of risks, such as their … developers, testers, and operations staff. https://atlas.mitre.org/mitigations https://github.com/mitre-atlas/arsenal https://caldera.mitre.org/ 10 AI ASSURANCE A REPEATABLE PROCESS FOR …

COVID-19 Healthcare Coalition Surveys Patients on Telehealth Impact During COVID-19

News Release
April 13, 2021
… visits with 79% of respondents being satisfied with their telehealth visit and 73% expecting to continue to receive healthcare services virtually beyond the pandemic. The 20-question survey captured the … are consistent across age ranges, insurance type, and regardless of whether the patient lives in an urban, suburban, or rural location,” said Steve Ommen, M.D., medical director, Mayo Clinic …

Agent-Directed Simulation for Systems Engineering

Publication
March 01, 2009
… individual  is  suspicious  enough  to  interdict,  to  keep  tracking,  or  to  break  contact.    Further,  as  the decisions  … Cliffs,  NJ:  Prentice‐Hall, 1963.  [22]  K.  J.  Dooley,  "Simulation  Research  Methods,"  Com nio   Bain  pa n  to Organizations,  J.  A.  C. um,  Ed. Oxford, UK: Blackwell, 2002.  [23]  …

The Web Mashup Scripting Language Profile

Publication
March 01, 2007
… but with a different purpose than WMSL. For example, the hcard Microformat is used to embed contact information in HTML pages. RDFa [15] serves to embed metadata such as those defined by … Services Computing (SCC 06), Chicago USA. (Please see the extended version at:http://tinyurl.com/28svgr) [4] Sabbouh M. et al. Using Semantic Web Technologies to Enable Interoperability of … information on Asynchronous Javascript and XML (AJAX) available at: http://www.ajaxmatters.com/ [10] Really Simple Syndication (RSS) 2.0 specification, available at: …

Data Mining for Network Intrusion Detection: How to Get Started

Publication
August 01, 2001
… of specialized tools. For example, we have tried the tools Clementine (http://www.spss.com/Clementine/), Gritbot (http://www.rulequest.com/gritbot-info.html), and a few others. But remember that obtaining data mining software is a … IP address X, and a particular IP address Y, how many unique destination IP addresses were contacted in a specific time window Z. A high value of this measure could give an indication of …
  • First page
  • Previous page
  • …
  • Page 117
  • Page 118
  • Page 119
  • Page 120
  • Current page 121
  • Page 122
  • Page 123
  • Page 124
  • Page 125
  • …
  • Next page
  • Last page
Displaying 1201 - 1210 of 1799
MITRE logo

Subscribe to the MITRE 360 newsletter.

Footer links

  • Contact Us
  • Locations
  • Careers
  • Disclosures
  • Privacy Policy
  • Terms of Use
  • Manage Cookies
  • Partnership Network Login
  • Remote Access Login

Footer social links