Sciweavers

1405 search results - page 33 / 281
» We Are No Longer A Priesthood
Sort
View
99
Voted
FUIN
2007
104views more  FUIN 2007»
15 years 14 days ago
Modelling and Checking Timed Authentication of Security Protocols
In this paper we offer a novel methodology for verifying correctness of (timed) security protocols. The idea consists in computing the time of a correct execution of a session and ...
Gizela Jakubowska, Wojciech Penczek
94
Voted
ACL
2009
14 years 10 months ago
Semi-supervised Learning of Dependency Parsers using Generalized Expectation Criteria
In this paper, we propose a novel method for semi-supervised learning of nonprojective log-linear dependency parsers using directly expressed linguistic prior knowledge (e.g. a no...
Gregory Druck, Gideon S. Mann, Andrew McCallum
78
Voted
INTERSPEECH
2010
14 years 7 months ago
Say what? why users choose to speak their web queries
The context in which a speech-driven application is used (or conversely not used) can be an important signal for recognition engines, and for spoken interface design. Using large-...
Maryam Kamvar, Doug Beeferman
ICDCSW
2011
IEEE
14 years 4 days ago
Finding a "Kneedle" in a Haystack: Detecting Knee Points in System Behavior
—Computer systems often reach a point at which the relative cost to increase some tunable parameter is no longer worth the corresponding performance benefit. These “knees” t...
Ville Satopaa, Jeannie R. Albrecht, David Irwin, B...
CHI
2009
ACM
16 years 1 months ago
Toward a unified theory of the multitasking continuum: from concurrent performance to task switching, interruption, and resumpti
Multitasking in user behavior can be represented along a continuum in terms of the time spent on one task before switching to another. In this paper, we present a theory of behavi...
Dario D. Salvucci, Niels Taatgen, Jelmer P. Borst