Security of e-voting systems does not only depend on the voting protocol 1 or the software used but concerns the whole system with all its components. To guarantee security a holi...
In many areas of NLP reuse of utility tools such as parsers and POS taggers is now common, but this is still rare in NLG. The subfield of surface realisation has perhaps come clos...
Anja Belz, Mike White, Josef van Genabith, Deirdre...
— We present a statistical approach for software agents to learn ontology concepts from peer agents by asking them whether they can reach consensus on significant differences bet...
Framework-intensive applications (e.g., Web applications) heavily use temporary data structures, often resulting in performance bottlenecks. This paper presents an optimized blend...
The Florida Public Hurricane Loss Model (FPHLM) developed in the State of Florida offers an open, public and effective tool for the government to regulate the insurance ratemaking...
Shu-Ching Chen, Min Chen, Na Zhao, Shahid Hamid, K...