Sciweavers

470 search results - page 54 / 94
» FORM facts
Sort
View
ISSA
2004
13 years 11 months ago
A General Methodology For The Development Of An Effective Information Security Policy
In today's hi-tech world, conventional physical security methods are simply insufficient for the protection of an organisation's information assets. This is because of t...
Arvish Ramdeyal
INTERACT
2003
13 years 11 months ago
In Search of Resonant Human Computer Interaction: Building and Testing Aesthetic Installations
: Resonance (Gibson, 1986) of users while interacting with a product should be a key issue in the development of human computer interaction. Because resonance requires developing o...
Caroline Hummels, Philip R. Ross, Kees Overbeeke
ACL
1998
13 years 11 months ago
Neural Network Recognition of Spelling Errors
One area in which artificial neural networks (ANNs) may strengthen NLP systems is in the identification of words under noisy conditions. In order to achieve this benefit when spel...
Mark Lewellen
CLEF
2010
Springer
13 years 11 months ago
Language Identification Strategies for Cross Language Information Retrieval
In our participation to the 2010 LogCLEF track we focused on the analysis of the European Library (TEL) logs and in particular we experimented with the identification of the natura...
Alessio Bosca, Luca Dini
ACTA
2007
126views more  ACTA 2007»
13 years 10 months ago
The syntactic monoid of hairpin-free languages
The study of hairpin-free words has been initiated in the context of DNA computing. DNA strands that, theoretically speaking, are finite strings over the alphabet {A, G, C, T} are...
Lila Kari, Kalpana Mahalingam, Gabriel Thierrin