Sciweavers

2116 search results - page 345 / 424
» Resource Analysis by Sup-interpretation
Sort
View
DIMVA
2007
13 years 10 months ago
Protecting the Intranet Against "JavaScript Malware" and Related Attacks
The networking functionality of JavaScript is restricted by the Same Origin Policy (SOP). However, as the SOP applies on a document level, JavaScript still possesses certain functi...
Martin Johns, Justus Winter
LREC
2010
201views Education» more  LREC 2010»
13 years 10 months ago
Cultural Heritage: Knowledge Extraction from Web Documents
This article presents the use of NLP techniques (text mining, text analysis) to develop specific tools that allow to create linguistic resources related to the cultural heritage d...
Eva Sassolini, Alessandra Cinini
LREC
2010
151views Education» more  LREC 2010»
13 years 10 months ago
Annotation Scheme and Gold Standard for Dutch Subjective Adjectives
Many techniques are developed to derive automatically lexical resources for opinion mining. In this paper we present a gold standard for Dutch adjectives developed for the evaluat...
Isa Maks, Piek Vossen
LREC
2010
189views Education» more  LREC 2010»
13 years 10 months ago
Constructing an Annotated Story Corpus: Some Observations and Issues
This paper discusses our ongoing work on constructing an annotated corpus of children's stories for further studies on the linguistic, computational, and cognitive aspects of...
Oi Yee Kwong
DMS
2008
167views Multimedia» more  DMS 2008»
13 years 10 months ago
Testing Multi-agent Systems for Deadlock Detection Based on UML Models
There is a growing demand for Multi-Agent Systems (MAS) in the software industry. The autonomous agent interaction in a dynamic software environment can potentially lead to runtim...
Nariman Mani, Vahid Garousi, Behrouz Homayoun Far