Conventional encryption technology often requires users to protect a secret key by selecting a password or passphrase. While a good passphrase will only be known to the user, it a...
Carl M. Ellison, Chris Hall, Randy Milbert, Bruce ...
In order to respond correctly to a free form factual question given a large collection of texts, one needs to understand the question to a level that allows determining some of th...
Considering the available body of literature on continuous EDAs, one must state that many important questions are still unanswered, e.g.: How do continuous EDAs really work, and h...
The Slot Filling task requires a system to automatically distill information from a large document collection and return answers for a query entity with specified attributes (`slot...
Zheng Chen, Suzanne Tamang, Adam Lee, Xiang Li, Ma...
Abstract. We analyze the expected cost of a greedy active learning algorithm. Our analysis extends previous work to a more general setting in which different queries have differe...