Sciweavers

8512 search results - page 147 / 1703
» Computing Theory With Relevance
Sort
View
CCS
2006
ACM
14 years 2 days ago
On the modeling and analysis of obligations
Traditional security policies largely focus on access control requirements, which specify who can access what under what circumstances. Besides access control requirements, the av...
Keith Irwin, Ting Yu, William H. Winsborough
LREC
2008
117views Education» more  LREC 2008»
13 years 9 months ago
Chooser: a Multi-Task Annotation Tool
The paper presents a tool assisting manual annotation of linguistic data developed at the Department of Computational linguistics, IBL-BAS. Chooser is a general-purpose modular ap...
Svetla Koeva, Borislav Rizov, Svetlozara Leseva
IJCINI
2007
112views more  IJCINI 2007»
13 years 8 months ago
Neo-Symbiosis: The Next Stage in the Evolution of Human Information Interaction
The purpose of this paper is to re-address the vision of human-computer symbiosis as originally expressed by J.C.R. Licklider nearly a half-century ago and to argue for the releva...
Douglas Griffith, Frank L. Greitzer
AES
2005
Springer
105views Cryptology» more  AES 2005»
13 years 8 months ago
TH-collocation for the biharmonic equation
This paper is intended as a contribution to enhance orthogonal collocation methods. In this, a novel collocation method--TH-collocation--is applied to the biharmonic equation and ...
Martín Díaz, Ismael Herrera
JMLR
2002
83views more  JMLR 2002»
13 years 8 months ago
On Online Learning of Decision Lists
A fundamental open problem in computational learning theory is whether there is an attribute efficient learning algorithm for the concept class of decision lists (Rivest, 1987; Bl...
Ziv Nevo, Ran El-Yaniv