Sciweavers

1683 search results - page 309 / 337
» Natural Language Processing (almost) from Scratch
Sort
View
HICSS
2003
IEEE
90views Biometrics» more  HICSS 2003»
14 years 3 months ago
Information Technology Augmentation of The Skilled Facilitator Approach
Work in the new millennium requires globally distributed organizational members to collaborate in groups and make decisions. In general, research has shown that groups that use fa...
Mark Adkins, Robert Younger, Roger Schwarz
SACMAT
2010
ACM
14 years 2 months ago
Monitoring security policies with metric first-order temporal logic
We show the practical feasibility of monitoring complex security properties using a runtime monitoring approach for metric first-order temporal logic. In particular, we show how ...
David A. Basin, Felix Klaedtke, Samuel Müller
ISMVL
2000
IEEE
134views Hardware» more  ISMVL 2000»
14 years 2 months ago
The 2-SAT Problem of Regular Signed CNF Formulas
Signed conjunctive normal form (signed CNF) is a classical conjunctive clause form using a generalized notion of literal, called signed atom. A signed atom is an expression of the...
Bernhard Beckert, Reiner Hähnle, Felip Many&a...
HICSS
1999
IEEE
125views Biometrics» more  HICSS 1999»
14 years 2 months ago
ASHRAM: Active Summarization and Markup
Typically, searching for information in a document collection amounts to refining a query and then scanning a large number of documents to determine their relevance. Active Summar...
Mary S. Neff, James W. Cooper
CHI
1997
ACM
14 years 1 months ago
Artificial Intelligence Techniques in the Interface to a Digital Video Library
For the huge amounts of audio and video material that could usefully be included in digital libraries, the cost of producing human-generated annotations and meta-data is prohibiti...
Alexander G. Hauptmann, Michael J. Witbrock, Micha...