Sciweavers

12493 search results - page 2282 / 2499
» Information Access in the Web
Sort
View
EACL
1989
ACL Anthology
15 years 3 months ago
User studies and the design of Natural Language Systems
This paper presents a critical discussion of the various approaches that have been used in the evaluation of Natural Language systems. We conclude that previous approaches have ne...
Steve Whittaker, Phil Stenton
UAI
2007
15 years 2 months ago
Aggregating Across Multiple Levels of Granularity to Meet Customer and Organizational Query Requirements
A research organization responds to a variety of customer requests. Each high level request is broken down into a set of low level requests. For each low level request, the resear...
Suzanne M. Mahoney
111
Voted
AIIDE
2009
15 years 2 months ago
Computational Support for Play Testing Game Sketches
Early-stage game prototypes need to be informative without requiring excessive commitments. Paper prototypes are frequently used as a way of trying out core mechanics while leavin...
Adam M. Smith, Mark J. Nelson, Michael Mateas
ATAL
2010
Springer
15 years 2 months ago
Bushfire BLOCKS: a modular agent-based simulation
Bushfire BLOCKS is a modular, distributed, agent-based simulation for exploring and informing bushfire response strategies. Separate independent modules capture the fire spread, e...
David Scerri, Ferdinand Gouw, Sarah L. Hickmott, I...
DBSEC
2009
122views Database» more  DBSEC 2009»
15 years 2 months ago
An Approach to Security Policy Configuration Using Semantic Threat Graphs
Managing the configuration of heterogeneous enterprise security mechanisms is a wholly complex task. The effectiveness of a configuration may be constrained by poor understanding a...
Simon N. Foley, William M. Fitzgerald
« Prev « First page 2282 / 2499 Last » Next »