Sciweavers

1360 search results - page 139 / 272
» Risk Analysis with Information Described in Natural Language
Sort
View
ICALP
2005
Springer
15 years 4 months ago
Computational Bounds on Hierarchical Data Processing with Applications to Information Security
Motivated by the study of algorithmic problems in the domain of information security, in this paper, we study the complexity of a new class of computations over a collection of va...
Roberto Tamassia, Nikos Triandopoulos
UIST
2009
ACM
15 years 5 months ago
Activity analysis enabling real-time video communication on mobile phones for deaf users
We describe our system called MobileASL for real-time video communication on the current U.S. mobile phone network. The goal of MobileASL is to enable Deaf people to communicate w...
Neva Cherniavsky, Jaehong Chon, Jacob O. Wobbrock,...
COLING
2010
14 years 5 months ago
Expressing OWL axioms by English sentences: dubious in theory, feasible in practice
With OWL (Web Ontology Language) established as a standard for encoding ontologies on the Semantic Web, interest has begun to focus on the task of verbalising OWL code in controll...
Richard Power, Allan Third
CLEF
2006
Springer
15 years 2 months ago
University of Twente at GeoCLEF 2006: Geofiltered Document Retrieval
In this report we describe the approach of the University of Twente to the 2006 GeoCLEF task. It is based on retrieval by content and the subsequent filtering by geographical rele...
Claudia Hauff, Dolf Trieschnigg, Henning Rode
LREC
2008
95views Education» more  LREC 2008»
15 years 4 days ago
Evaluation Metrics for Automatic Temporal Annotation of Texts
Recent years have seen increasing attention in temporal processing of texts as well as a lot of standardization effort of temporal information in natural language. A central part ...
Xavier Tannier, Philippe Muller