Sciweavers

510 search results - page 88 / 102
» Lexical Rules: What are they
Sort
View
DMIN
2009
144views Data Mining» more  DMIN 2009»
13 years 6 months ago
Fish or Shark - Data Mining Online Poker
In this paper, data mining techniques are used to analyze data gathered from online poker. The study focuses on short-handed Texas Hold'em, and the data sets used contain thou...
Ulf Johansson, Cecilia Sönströd
HVEI
2009
13 years 6 months ago
Model validation of channel zapping quality
In an earlier paper we showed, that perceived quality of channel zapping is related to the perceived quality of download time of web browsing, as suggested by ITU-T Rec.G.1030. We...
Robert E. Kooij, Floris Nicolai, Ahmed Kamal, Kjel...
ICONFERENCE
2011
13 years 3 months ago
Epistemic presumptions of authorship
The major concern of this paper is the cultural ramification of the bibliographic conception of “authorship.” Beginning with Foucault’s question “what is an author” and ...
Richard P. Smiraglia, Hur-Li Lee, Hope A. Olson
HOST
2011
IEEE
12 years 8 months ago
Enhancing security via provably trustworthy hardware intellectual property
—We introduce a novel hardware intellectual property acquisition protocol, show how it can support the transfer of provably trustworthy modules between hardware IP producers and ...
Eric Love, Yier Jin, Yiorgos Makris
ANLP
1994
101views more  ANLP 1994»
13 years 9 months ago
Sublanguage Engineering In The Fog System
FoG currently produces bilingual marine and public weather forecasts at several Canadian weather offices. The system is engineered to reflect "good professional style" a...
Richard I. Kittredge, Eli Goldberg, Myunghee Kim, ...