Sciweavers

26354 search results - page 109 / 5271
» How we refactor, and how we know it
Sort
View
ASPLOS
2008
ACM
14 years 8 days ago
How low can you go?: recommendations for hardware-supported minimal TCB code execution
We explore the extent to which newly available CPU-based security technology can reduce the Trusted Computing Base (TCB) for security-sensitive applications. We find that although...
Jonathan M. McCune, Bryan Parno, Adrian Perrig, Mi...
CSCW
2008
ACM
14 years 1 days ago
The computational geowiki: what, why, and how
Google Maps and its spin-offs are highly successful, but they have a major limitation: users see only pictures of geographic data. These data are inaccessible except by limited ve...
Reid Priedhorsky, Loren G. Terveen
LREC
2008
108views Education» more  LREC 2008»
13 years 11 months ago
Spatiotemporal Annotation Using MiniSTEx: how to deal with Alternative, Foreign, Vague and/or Obsolete Names?
We are currently developing MiniSTEx, a spatiotemporal annotation system to handle temporal and/or geospatial information directly and indirectly expressed in texts. In the end, t...
Ineke Schuurman
AVI
2004
13 years 11 months ago
How users interact with biodiversity information using TaxonTree
Biodiversity databases have recently become widely available to the public and to other researchers. To retrieve information from these resources, users must understand the underl...
Bongshin Lee, Cynthia Sims Parr, Dana Campbell, Be...
EACL
2006
ACL Anthology
13 years 11 months ago
A Two-Stage Approach to Retrieving Answers for How-To Questions
This paper addresses the problem of automatically retrieving answers for how-to questions, focusing on those that inquire about the procedure for achieving a specific goal. For su...
Ling Yin