Verification of legitimate access of documents, which is one aspect of the umbrella of problems in the Insider Threat category, is a challenging problem. This paper describes the r...
Boanerges Aleman-Meza, Phillip Burns, Matthew Eave...
This paper describes the PASCAL Network of Excellence first Recognising Textual Entailment (RTE-1) Challenge benchmark1 . The RTE task is defined as recognizing, given two text f...
Most keyword search engines returns directly matching keyword phrases. However, publishers cannot anticipate all possible ways in which users would search for the items in their d...
Dipti Aswath, Syed Toufeeq Ahmed, James D'cunha, H...
In this paper we propose a method that, given a query submitted to a search engine, suggests a list of related queries. The related queries are based in previously issued queries, ...
Ricardo A. Baeza-Yates, Carlos A. Hurtado, Marcelo...
In order to support various requirements from the user’s perspective, digital library (DL) systems may need to apply a large variety of services, such as query services for a spe...