Computer security competitions and challenges are a way to foster innovation and educate students in a highly-motivating setting. In recent years, a number of different security co...
Nicholas Childers, Bryce Boe, Lorenzo Cavallaro, L...
—User profiles derived from Web navigation data are used in important e-commerce applications such as Web personalization, recommender systems, and Web analytics. In the open en...
This paper deals with the uses of the annotations of third person singular neuter pronouns in the DAD parallel and comparable corpora of Danish and Italian texts and spoken data. ...
Human linguistic annotation is crucial for many natural language processing tasks but can be expensive and time-consuming. We explore the use of Amazon's Mechanical Turk syst...
Rion Snow, Brendan O'Connor, Daniel Jurafsky, Andr...
Programming and developing of small scale software applications can be accomplished with simple command-line compilers that can be used to compile, test, and execute code generati...
Ali Farahmand Nejad, Shahabedin Bayati, Sadegh Kha...