منابع مشابه
Questioning Answering By Pattern Matching, Web-Proofing, Semantic Form Proofing
In this paper, we introduce the University at Albany’s question answering system, ILQUA. It is developed on the following methods: pattern matching over annotated text, web-proofing and semantic form proofing. These methods are currently used in other QA systems, however, we revised them to work together in our QA system.
متن کاملFuture proofing
far the fastest growing agricultural producer with output expected to increase by more than 40 per cent between now and 2019. Production growth is also expected to be well above 20 per cent in China, India, the Russian Federation and the Ukraine. But the report warns that increased global food production could still lead to a large section of the global population going hungry. Although the wor...
متن کاملIdiot-Proofing Authentication
We develop a mechanism by which a server can guarantee that client passwords contain a certain amount of (actually random) entropy while not actually knowing these passwords. We define and implement a protocol between a client and server used during password generation. Importantly, while we greatly modify the process of generating a password, the actual day-to-day use of this password is mostl...
متن کامل‘Evolution-Proofing’ Antibacterials
When antibiotics first came into use, they were so effective at curbing bacterial infections that it seemed the age-old battle of man vs. microbe would soon be at an end [1]. Eighty years and dozens of drugs later, we now know better. Following each new antibiotic’s launch, reports soon accumulated that once-treatable infections were becoming refractory to the drug [2]. Nowadays, many infectiou...
متن کاملTamper-proofing Software Watermarks
We introduce a novel method called constant encoding, which can be used to tamper-proof a software watermark that is embedded in the dynamic data structures of a program. Our novel tamperproofing method is based on transforming numeric or non-numeric constant values in the text of the watermarked program into function calls whose value depends on the watermark data structure. Under reasonable a...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Daedalus
سال: 2016
ISSN: 0011-5266,1548-6192
DOI: 10.1162/daed_a_00402