Sciweavers

54 search results - page 7 / 11
» Five deep questions in computing
Sort
View
CSFW
1999
IEEE
15 years 1 months ago
Process Algebra and Non-Interference
The information security community has long debated the exact definition of the term `security'. Even if we focus on the more modest notion of confidentiality the precise def...
Peter Y. A. Ryan, Steve A. Schneider
AIED
2005
Springer
15 years 2 months ago
Serious Games for Language Learning: How Much Game, How Much AI?
Modern computer games show potential not just for engaging and entertaining users, but also in promoting learning. Game designers employ a range of techniques to promote long-term ...
W. Lewis Johnson, Hannes Högni Vilhjál...
KCAP
2011
ACM
14 years 8 days ago
An analysis of open information extraction based on semantic role labeling
Open Information Extraction extracts relations from text without requiring a pre-specified domain or vocabulary. While existing techniques have used only shallow syntactic featur...
Janara Christensen, Mausam, Stephen Soderland, Ore...
DAM
2008
114views more  DAM 2008»
14 years 9 months ago
Efficient solutions to the braid isotopy problem
We describe the most efficient solutions to the word problem of Artin's braid group known so far, i.e., in other words, the most efficient solutions to the braid isotopy probl...
Patrick Dehornoy
SC
2005
ACM
15 years 3 months ago
DI-GRUBER: A Distributed Approach to Grid Resource Brokering
Managing usage service level agreements (USLAs) within environments that integrate participants and resources spanning multiple physical institutions is a challenging problem. Mai...
Catalin Dumitrescu, Ioan Raicu, Ian T. Foster