This paper presents two optimalizations of standard parsing techniques applied to Czech as a representative of a free word order language with rich morphology. Our approach is bas...
In spite of numerous advantages of biometrics-based personal authentication systems over traditional security systems based on token or knowledge, they are vulnerable to attacks t...
Eleven open source software projects written in C/C++ were analyzed to determine if the number of committing developers impacts code quality. We use cyclomatic complexity, lines o...
Brandon Norick, Justin Krohn, Eben Howard, Ben Wel...
In order to solve task 2 of the KDD Cup 2002, we exploited various available information sources. In particular, use of relational information describing the interactions among ge...
Mark-A. Krogel, Marcus Denecke, Marco Landwehr, To...
The author summarizes his experience creating a story-based simulation from raw documentary footage taken in the aftermath of the 2010 earthquake in Haiti. The use of Propp’s typ...