Collectors of confidential data, such as governmental agencies, hospitals, or search engine providers, can be pressured to permit data to be used for purposes other than that for ...
Cynthia Dwork, Moni Naor, Toniann Pitassi, Guy N. ...
We offer a transition system representing a high-level but detailed architecture for SMT solvers that combine a propositional SAT engine with solvers for multiple disjoint theorie...
Research environments have been changing with the availability of new technologies for decades. Researchers are benefited from digital libraries, online databases, and Web search...
Abstract)",4th Annual Walter Lincoln Hawkins Research Conference, RPI, November 2005. B. Hill, \Correlated Caching for Correlated Data", 2nd Annual Walter Lincoln Hawkins...
We describe Joost, our QA system for Dutch, which makes extensive use of dependency relations. We analyzed the full Dutch CLEF QA corpus syntactically and mined it off-line for i...
Gosse Bouma, Jori Mur, Gertjan van Noord, Lonneke ...