We set out to answer a question we were asked by software project management: how much effort remains to be spent on a specific software project and how will that effort be distri...
To enable conversational QA, it is important to examine key issues addressed in conversational systems in the context of question answering. In conversational systems, understandi...
A computational model for the acquisition of knowledge from encyclopedic texts is described. The model has been implemented in a program, called SNOWY, that reads unedited texts f...
From pre-schools to high schools, at home and in museums, the educational community has embraced the use of computers as a teaching tool. Yet many institutions will simply install...
Lori L. Scarlatos, Amy Bruckman, Allison Druin, Mi...
Abstract. In 1998, Boneh, Durfee and Frankel [4] presented several attacks on RSA when an adversary knows a fraction of the secret key bits. The motivation for these so-called part...