Sciweavers

6607 search results - page 258 / 1322
» Making TeX Work
Sort
View
ICFP
2009
ACM
16 years 4 months ago
Purely functional lazy non-deterministic programming
Functional logic programming and probabilistic programming have demonstrated the broad benefits of combining laziness (non-strict evaluation with sharing of the results) with non-...
Sebastian Fischer, Oleg Kiselyov, Chung-chieh Shan
POPL
2009
ACM
16 years 4 months ago
Flexible types: robust type inference for first-class polymorphism
We present HML, a type inference system that supports full firstclass polymorphism where few annotations are needed: only function parameters with a polymorphic type need to be an...
Daan Leijen
CHI
2009
ACM
16 years 4 months ago
Acquiring a professional "second life": problems and prospects for the use of virtual worlds in business
The current surge of interest in virtual worlds suggests they are poised to make an evolutionary leap to the workplace, as instant messaging did a decade ago. In recent work we ha...
Jason B. Ellis, Katherine Bessière, Wendy A...
EACL
2009
ACL Anthology
16 years 4 months ago
Analysing Wikipedia and Gold-Standard Corpora for NER Training
Named entity recognition (NER) for English typically involves one of three gold standards: MUC, CoNLL, or BBN, all created by costly manual annotation. Recent work has used Wikipe...
Joel Nothman, Tara Murphy, James R. Curran
KDD
2003
ACM
127views Data Mining» more  KDD 2003»
16 years 4 months ago
Towards NIC-based intrusion detection
We present and evaluate a NIC-based network intrusion detection system. Intrusion detection at the NIC makes the system potentially tamper-proof and is naturally extensible to wor...
Matthew Eric Otey, Srinivasan Parthasarathy, Amol ...