Sciweavers

2208 search results - page 139 / 442
» Memory Practices in the Sciences
Sort
View
98
Voted
SOFSEM
2000
Springer
15 years 5 months ago
Towards High Speed Grammar Induction on Large Text Corpora
Abstract. In this paper we describe an e cient and scalable implementation for grammar induction based on the EMILE approach ( 2], 3], 4], 5], 6]). The current EMILE 4.1 implementa...
Pieter W. Adriaans, Marten Trautwein, Marco Vervoo...
149
Voted
CSCW
2011
ACM
14 years 8 months ago
Creating a context of trust with ICTs: restoring a sense of normalcy in the environment
This paper reports on an ethnographic study of the technology-enabled behavior that took place amongst a citizen population living in a conflict zone. We interviewed 65 Iraqi citi...
Bryan Semaan, Gloria Mark
TCOS
2010
14 years 8 months ago
J-PAKE: Authenticated Key Exchange without PKI
Password Authenticated Key Exchange (PAKE) is one of the important topics in cryptography. It aims to address a practical security problem: how to establish secure communication be...
Feng Hao, Peter Ryan
136
Voted
SOFSEM
2012
Springer
13 years 9 months ago
Recent Challenges and Ideas in Temporal Synthesis
In automated synthesis, we transform a specification into a system that is guaranteed to satisfy the specification against all environments. While modelchecking theory has led to...
Orna Kupferman
ICDCS
2009
IEEE
15 years 11 months ago
Minimizing the Hidden Cost of RDMA
Remote Direct Memory Access (RDMA) is a mechanism whereby data is moved directly between the application memory of the local and remote computer. In bypassing the operating system...
Philip Werner Frey, Gustavo Alonso