Author of the publication

Automatic Generation of Context-Based Fill-in-the-Blank Exercises Using Co-occurrence Likelihoods and Google n-grams.

, and . BEA@NAACL-HLT, page 23-30. The Association for Computer Linguistics, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Performance Study of a Compiler/Hardware Approach to Embedded Systems Security., , , , , and . ISI, volume 3495 of Lecture Notes in Computer Science, page 543-548. Springer, (2005)Detecting memory spoofing in secure embedded systems using cache-aware FPGA guards., , , and . IAS, page 125-130. IEEE, (2010)Application-Kernel Collaboration Mechanisms for Real-Time Cluster Server under Overloading., , , , and . HPCC, page 258-265. IEEE Computer Society, (2008)Algorithms for budget-constrained survivable topology design., , and . ICC, page 2162-2166. IEEE, (2002)SPEE: A Secure Program Execution Environment tool using code integrity checking., , and . J. High Speed Networks, 15 (1): 21-32 (2006)A Microeconomic Approach to Optimal File Allocation., and . ICDCS, page 28-35. IEEE Computer Society, (1986)Annotation scaffolds for manipulating articulated objects., , , and . Auton. Robots, 45 (6): 885-903 (2021)SAFE-OPS: An approach to embedded software security., , , , and . ACM Trans. Embed. Comput. Syst., 4 (1): 189-210 (2005)Addressing application integrity attacks using a reconfigurable architecture., , and . FPGA, page 250. ACM, (2004)High-Performance Software Protection Using Reconfigurable Architectures., , , , and . Proc. IEEE, 94 (2): 419-431 (2006)