Sciweavers

1405 search results - page 33 / 281
» We Are No Longer A Priesthood
Sort
View
FUIN
2007
104views more  FUIN 2007»
14 years 9 months ago
Modelling and Checking Timed Authentication of Security Protocols
In this paper we offer a novel methodology for verifying correctness of (timed) security protocols. The idea consists in computing the time of a correct execution of a session and ...
Gizela Jakubowska, Wojciech Penczek
ACL
2009
14 years 7 months ago
Semi-supervised Learning of Dependency Parsers using Generalized Expectation Criteria
In this paper, we propose a novel method for semi-supervised learning of nonprojective log-linear dependency parsers using directly expressed linguistic prior knowledge (e.g. a no...
Gregory Druck, Gideon S. Mann, Andrew McCallum
INTERSPEECH
2010
14 years 4 months ago
Say what? why users choose to speak their web queries
The context in which a speech-driven application is used (or conversely not used) can be an important signal for recognition engines, and for spoken interface design. Using large-...
Maryam Kamvar, Doug Beeferman
114
Voted
ICDCSW
2011
IEEE
13 years 9 months ago
Finding a "Kneedle" in a Haystack: Detecting Knee Points in System Behavior
—Computer systems often reach a point at which the relative cost to increase some tunable parameter is no longer worth the corresponding performance benefit. These “knees” t...
Ville Satopaa, Jeannie R. Albrecht, David Irwin, B...
CHI
2009
ACM
15 years 10 months ago
Toward a unified theory of the multitasking continuum: from concurrent performance to task switching, interruption, and resumpti
Multitasking in user behavior can be represented along a continuum in terms of the time spent on one task before switching to another. In this paper, we present a theory of behavi...
Dario D. Salvucci, Niels Taatgen, Jelmer P. Borst