Sciweavers

111 search results - page 17 / 23
» Approaching Question Answering by Means of Paragraph Validat...
Sort
View
TIT
2010
146views Education» more  TIT 2010»
13 years 2 months ago
Cooperation with an untrusted relay: a secrecy perspective
We consider the communication scenario where a source-destination pair wishes to keep the information secret from a relay node despite wanting to enlist its help. For this scenario...
Xiang He, Aylin Yener
ISDA
2009
IEEE
14 years 2 months ago
A Combined Query Expansion Technique for Retrieving Opinions from Blogs
In this paper, we discuss the the role of the retrieval component in an TREC style opinion question answering system. Since blog retrieval differs from traditional ad-hoc document...
Saeedeh Momtazi, Stefan Kazalski, Dietrich Klakow
EDOC
2004
IEEE
13 years 11 months ago
Towards an MDA-Oriented UML Profile for Distribution
The era of distributed systems is upon us. Middlewarespecific concerns, and especially the distribution concern, which is the core of any middleware-mediated application, are addr...
Raul Silaghi, Frédéric Fondement, Al...
ENTCS
2002
148views more  ENTCS 2002»
13 years 7 months ago
A Declarative Debugging System for Lazy Functional Logic Programs
We present a declarative debugger for lazy functional logic programs with polymorphic type discipline. Whenever a computed answer is considered wrong by the user (error symptom), ...
Rafael Caballero, Mario Rodríguez-Artalejo
CHI
2011
ACM
12 years 11 months ago
Does domain highlighting help people identify phishing sites?
Phishers are fraudsters that mimic legitimate websites to steal user’s credential information and exploit that information for identity theft and other criminal activities. Vari...
Eric Lin, Saul Greenberg, Eileah Trotter, David Ma...