Sciweavers

3134 search results - page 321 / 627
» Computing full disjunctions
Sort
View
CORR
2011
Springer
148views Education» more  CORR 2011»
14 years 6 months ago
Dominating Manipulations in Voting with Partial Information
We consider manipulation problems when the manipulator only has partial information about the votes of the nonmanipulators. Such partial information is described by an information...
Vincent Conitzer, Toby Walsh, Lirong Xia
ACL
2011
14 years 6 months ago
Template-Based Information Extraction without the Templates
Standard algorithms for template-based information extraction (IE) require predefined template schemas, and often labeled data, to learn to extract their slot fillers (e.g., an ...
Nathanael Chambers, Dan Jurafsky
ACMIDC
2011
14 years 6 months ago
Examining values: an analysis of nine years of IDC research
Explicitly examining the values held by a research community provides a tool in which participants can define its culture, conduct informed research, and reflect on their design p...
Svetlana Yarosh, Iulian Radu, Seth Hunter, Eric Ro...
ACNS
2011
Springer
231views Cryptology» more  ACNS 2011»
14 years 6 months ago
Cold Boot Key Recovery by Solving Polynomial Systems with Noise
A method for extracting cryptographic key material from DRAM used in modern computers has been recently proposed in [9]; the technique was called Cold Boot attacks. When considerin...
Martin Albrecht, Carlos Cid
CHI
2011
ACM
14 years 6 months ago
AnglePose: robust, precise capacitive touch tracking via 3d orientation estimation
We present a finger-tracking system for touch-based interaction which can track 3D finger angle in addition to position, using low-resolution conventional capacitive sensors, th...
Simon Rogers, John Williamson, Craig Stewart, Rode...