Sciweavers

679 search results - page 109 / 136
» Algorithmic modifications to SPIHT
Sort
View
DOCENG
2008
ACM
15 years 5 months ago
PrintMonkey: giving users a grip on printing the web
Web content is notoriously difficult to capture on a printed page due to inconsistent and undesired results. Items that users may not want to print, such as media, navigation menu...
Jennifer Baldwin, James A. Rowson, Yvonne Coady
FSE
2008
Springer
162views Cryptology» more  FSE 2008»
15 years 4 months ago
Collisions on SHA-0 in One Hour
At Crypto 2007, Joux and Peyrin showed that the boomerang attack, a classical tool in block cipher cryptanalysis, can also be very useful when analyzing hash functions. They applie...
Stéphane Manuel, Thomas Peyrin
LREC
2010
144views Education» more  LREC 2010»
15 years 4 months ago
Mapping between Dependency Structures and Compositional Semantic Representations
This paper investigates the mapping between two semantic formalisms, namely the tectogrammatical layer of the Prague Dependency Treebank 2.0 (PDT) and (Robust) Minimal Recursion S...
Max Jakob, Markéta Lopatková, Valia ...
LREC
2010
159views Education» more  LREC 2010»
15 years 4 months ago
Improvements in Parsing the Index Thomisticus Treebank. Revision, Combination and a Feature Model for Medieval Latin
The creation of language resources for less-resourced languages like the historical ones benefits from the exploitation of language-independent tools and methods developed over th...
Marco Passarotti, Felice dell'Orletta
AAAI
2006
15 years 4 months ago
Reinforcement Learning with Human Teachers: Evidence of Feedback and Guidance with Implications for Learning Performance
As robots become a mass consumer product, they will need to learn new skills by interacting with typical human users. Past approaches have adapted reinforcement learning (RL) to a...
Andrea Lockerd Thomaz, Cynthia Breazeal