Designers are often faced with difficult tradeoffs between easing the user's burden by making security decisions for them and offering features that ensure that users can mak...
Mary Ellen Zurko, Charlie Kaufman, Katherine Spanb...
We present a working Arabic information extraction (IE) system that is used to analyze large volumes of news texts every day to extract the named entity (NE) types person, organiz...
Wajdi Zaghouani, Bruno Pouliquen, Mohamed Ebrahim,...
This paper presents the recent technical advances in Monte-Carlo Tree Search for the Game of Go, shows the many similarities and the rare differences between the current best progr...
The under-representation of women in computer and information science (CIS) has created a crisis in availability of qualified CIS professionals and diversity of perspectives. Many...
Mary Beth Rosson, John M. Carroll, Dejin Zhao, Tim...
This paper explores area/parallelism tradeo s in the design of distributed shared-memory (DSM) multiprocessors built out of large single-chip computing nodes. In this context, are...