Constructing a program from a specification is a long-known general and fundamental problem. Besides its theoretical interest, this question also has practical implications, since...
We consider the round complexity of a basic cryptographic task: verifiable secret sharing (VSS). This well-studied primitive provides a good "test case" for our understan...
Using Web information in example-based dialogue systems is considered to be a good way to increase the topical relevance of system responses. However, Web content is mostly written...
ATM-based integrated services networks are likely to rely on the Virtaal Path (VP) concept as an intermediate resource management layer wherein key decisions concerning resource a...
Named entity (NE) recognition is a task in which proper nouns and numerical information in a document are detected and classified into categories such as person, organization, loc...