Sciweavers

155 search results - page 23 / 31
» Good Question! Statistical Ranking for Question Generation
Sort
View
88
Voted
CRYPTO
2005
Springer
127views Cryptology» more  CRYPTO 2005»
15 years 5 months ago
One-Way Secret-Key Agreement and Applications to Circuit Polarization and Immunization of Public-Key Encryption
Secret-key agreement between two parties Alice and Bob, connected by an insecure channel, can be realized in an informationtheoretic sense if the parties share many independent pai...
Thomas Holenstein, Renato Renner
ACL
2007
15 years 1 months ago
An Ensemble Method for Selection of High Quality Parses
While the average performance of statistical parsers gradually improves, they still attach to many sentences annotations of rather low quality. The number of such sentences grows ...
Roi Reichart, Ari Rappoport
83
Voted
ACL
1998
15 years 1 months ago
Dialogue Management in Vector-Based Call Routing
This paper describes a domain independent, automatically trained call router which directs customer calls based on their response to an open-ended "How may I direct your call...
Jennifer Chu-Carroll, Bob Carpenter
CORR
2008
Springer
176views Education» more  CORR 2008»
14 years 11 months ago
An evaluation of Bradfordizing effects
The purpose of this paper is to apply and evaluate the bibliometric method Bradfordizing for information retrieval (IR) experiments. Bradfordizing is used for generating core docu...
Philipp Mayr
TSE
1998
152views more  TSE 1998»
14 years 11 months ago
Communication and Organization: An Empirical Study of Discussion in Inspection Meetings
—This paper describes an empirical study that addresses the issue of communication among members of a software development organization. In particular, data was collected concern...
Carolyn B. Seaman, Victor R. Basili