Sciweavers

2826 search results - page 468 / 566
» A resource-based analysis of IT sourcing
Sort
View
LREC
2010
175views Education» more  LREC 2010»
15 years 3 months ago
Capturing Coercions in Texts: a First Annotation Exercise
In this paper we report the first results of an annotation exercise of argument coercion phenomena performed on Italian texts. Our corpus consists of ca 4000 sentences from the PA...
Elisabetta Jezek, Valeria Quochi
ECIR
2008
Springer
15 years 3 months ago
The Importance of Link Evidence in Wikipedia
Wikipedia is one of the most popular information sources on the Web. The free encyclopedia is densely linked. The link structure in Wikipedia differs from the Web at large: interna...
Jaap Kamps, Marijn Koolen
GRAPHICSINTERFACE
2008
15 years 3 months ago
Order and entropy in picture passwords
Previous efforts involving picture-based passwords have not focused on maintaining a measurably high level of entropy. Since password systems usually allow user selection of passw...
Saranga Komanduri, Dugald Ralph Hutchings
HCI
2007
15 years 3 months ago
An Epileptic Seizure Prediction Algorithm from Scalp EEG Based on Morphological Filter and Kolmogorov Complexity
Epilepsy is the most common neurological disorder in the world, second only to stroke. There are nearly 15 million patients suffer from refractory epilepsy, with no available ther...
Guanghua Xu, Jing Wang, Qing Zhang, Junming Zhu
HIS
2007
15 years 3 months ago
Genetic Programming meets Model-Driven Development
Genetic programming is known to provide good solutions for many problems like the evolution of network protocols and distributed algorithms. In such cases it is most likely a hard...
Thomas Weise, Michael Zapf, Mohammad Ullah Khan, K...