Sciweavers

2374 search results - page 428 / 475
» The language of machines
Sort
View
FTDB
2008
82views more  FTDB 2008»
13 years 9 months ago
Information Extraction
The automatic extraction of information from unstructured sources has opened up new avenues for querying, organizing, and analyzing data by drawing upon the clean semantics of str...
Sunita Sarawagi
IJMMS
2006
74views more  IJMMS 2006»
13 years 9 months ago
Constructing computer-based tutors that are socially sensitive: Politeness in educational software
Students rated 16 tutorial statements on negative politeness (i.e., how much the tutor ``allows me freedom to make my own decisions'') and positive politeness (i.e., how...
Richard E. Mayer, W. Lewis Johnson, Erin Shaw, Sah...
ISI
2006
Springer
13 years 9 months ago
Computational Modeling and Experimental Validation of Aviation Security Procedures
Security of civil aviation has become a major concern in recent years, leading to a variety of protective measures related to airport and aircraft security to be established by re...
Uwe Glässer, Sarah Rastkar, Mona Vajihollahi
JUCS
2008
157views more  JUCS 2008»
13 years 9 months ago
Using Conjunctions and Adverbs for Author Verification
: Linguistics and stylistics have been investigated for author identification for quite a while, but recently, we have testified a impressive growth in the volume with which lawyer...
Daniel Pavelec, Luiz S. Oliveira, Edson J. R. Just...
JUCS
2008
117views more  JUCS 2008»
13 years 9 months ago
Eliminating Cycles in Weak Tables
: Weak References constitute an elegant mechanism for an application to interact with its garbage collector. In most of its typical uses, weak references are used through weak tabl...
Alexandra Barros, Roberto Ierusalimschy