Sciweavers

350 search results - page 16 / 70
» What's in a Name
Sort
View
AWIC
2003
Springer
14 years 1 months ago
From Search Engines to Question-Answering Systems - The Need for New Tools
Abstract Search engines, with Google at the top, have many remarkable capabilities. But what is not among them is the deduction capability—the capability to synthesize an answer ...
Lotfi A. Zadeh
LREC
2010
130views Education» more  LREC 2010»
13 years 10 months ago
The Problems of Language Identification within Hugely Multilingual Data Sets
As the data for more and more languages is finding its way into digital form, with an increasing amount of this data being posted to the Web, it has become possible to collect lan...
Fei Xia, Carrie Lewis, William D. Lewis
LREC
2010
150views Education» more  LREC 2010»
13 years 10 months ago
Eslo: From Transcription to Speakers' Personal Information Annotation
This paper presents the preliminary works to put online a French oral corpus and its transcription. This corpus is the Socio-Linguistic Survey in Orleans, realized in 1968. First,...
Iris Eshkol, Denis Maurel, Nathalie Friburger
CL
2010
Springer
13 years 8 months ago
Isolating untrusted software extensions by custom scoping rules
In a modern programming language, scoping rules determine the visibility of names in various regions of a program [15]. In this work, we examine the idea of allowing an applicatio...
Philip W. L. Fong, Simon A. Orr
CSREASAM
2006
13 years 10 months ago
Using Synthetic Decoys to Digitally Watermark Personally-Identifying Data and to Promote Data Security
Identity theft continues to be an ever-present problem. Identity theft and other related crimes are becoming an unparalleled phenomenon that nearly everyone will have to deal with...
Jonathan White, Dale Thompson