Sciweavers

7596 search results - page 236 / 1520
» Challenges in forensic computing
Sort
View
ACL
2009
15 years 2 months ago
Validating the web-based evaluation of NLG systems
The GIVE Challenge is a recent shared task in which NLG systems are evaluated over the Internet. In this paper, we validate this novel NLG evaluation methodology by comparing the ...
Alexander Koller, Kristina Striegnitz, Donna Byron...
HCI
2009
15 years 2 months ago
The OASIS Concept
Abstract. OASIS is an Integrated Project with the aim to revolutionise the interoperability, quality, breadth and usability of services for all daily activities of the elderly, by ...
Evangelos Bekiaris, Silvio Bonfiglio
COLING
2010
14 years 11 months ago
Search with Synonyms: Problems and Solutions
Search with synonyms is a challenging problem for Web search, as it can easily cause intent drifting. In this paper, we propose a practical solution to this issue, based on co-cli...
Xing Wei, Fuchun Peng, Huihsin Tseng, Yumao Lu, Xu...
SP
2002
IEEE
117views Security Privacy» more  SP 2002»
15 years 4 months ago
Grids: The top ten questions
The design and implementation of a national computing system and data grid has become a reachable goal from both the computer science and computational science point of view. A di...
Jennifer M. Schopf, Bill Nitzberg
BIRTHDAY
2012
Springer
14 years 3 days ago
Secret Key Leakage from Public Key Perturbation of DLP-Based Cryptosystems
Finding efficient countermeasures for cryptosystems against fault attacks is challenged by a constant discovery of flaws in designs. Even elements, such as public keys, that do no...
Alexandre Berzati, Cécile Canovas-Dumas, Lo...