Abstract. In [1], we presented a method for automatic detection of action items from natural conversation. This method relies on supervised classification techniques that are trai...
This paper proposes a browser spoofing attack which can break the weakest link from the server to user, i.e., man-computerinterface, and hence defeat the whole security system of ...
With the evolution of the Web evolving towards the Semantic Web, where the information should be presented in a meaningful way for both humans and machines, arises the need for sem...
While many visualization tools exist that offer sophisticated functions for charting complex data, they still expect users to possess a high degree of expertise in wielding the to...
Yiwen Sun, Jason Leigh, Andrew E. Johnson, Sangyoo...
We have recently converted a dependency treebank, consisting of ancient Greek and Latin texts, from one annotation scheme to another that was independently designed. This paper ma...