Now showing items 39-58 of 353

• #### The Call of the Crowd: Event Participation in Location-based Social Services ﻿

(AAAI, 2014-05-16)
Understanding the social and behavioral forces behind event participation is not only interesting from the viewpoint of social science, but also has important applications in the design of personalized event recommender ...
• #### ‘Calling on the classical phone’: a distributional model of adjective-noun errors in learners’ English ﻿

(Association of Computational Linguistics, 2016-12-17)
In this paper we discuss three key points related to error detection (ED) in learners’ English. We focus on content word ED as one of the most challenging tasks in this area, illustrating our claims on adjective–noun (AN) ...
• #### CamFlow: Managed Data-sharing for Cloud Services ﻿

(IEEE, 2015-10-09)
A model of cloud services is emerging whereby a few trusted providers manage the underlying hardware and communications whereas many companies build on this infrastructure to offer higher level, cloud-hosted PaaS services ...
• #### Can local NURBS refinement be achieved by modifying only the user interface? ﻿

(Elsevier, 2015)
NURBS patches have a serious restriction: they are constrained to a strict rectangular topology. This means that a request to insert a single new control point will cause a row of control points to appear across the NURBS ...
• #### Cancer Hallmark Text Classification Using Convolutional Neural Networks ﻿

Methods based on deep learning approaches have recently achieved state-of-the-art performance in a range of machine learning tasks and are increasingly applied to natural language processing (NLP). Despite strong results ...
• #### Cancer Hallmarks Analytics Tool (CHAT): A text mining approach to organise and evaluate scientific literature on cancer ﻿

Motivation: To understand the molecular mechanisms involved in cancer development, significant efforts are being invested in cancer research. This has resulted in millions of scientific articles. An efficient and thorough ...
• #### Captain Buzz: An All-Smartphone Autonomous Delta-Wing Drone ﻿

(ACM, 2015-05-18)
Fully autonomous hobbyist drones are typically controlled using bespoke microcontrollers, or general purpose low-level controllers such as the Arduino. However, these devices only have limited compute power and sensing ...
• #### Capturing anomalies in the choice of content words in compositional distributional semantic space ﻿

(RANLP 2013 Organising Committee / ACL, 2013-09-07)
In this work, we present a new task for testing compositional distributional semantic models. Recently, there has been a spate of research into how distributional representations of individual words can be combined to ...
• #### Characterising the Spectral Properties and Time Variation of the In-Vehicle Wireless Communication Channel ﻿

(IEEE, 2014-06-04)
To deploy effective communication systems in vehicle cavities, it is critical to understand the time variation of the in-vehicle channel. Initially rapid channel variation is addressed, which is characterised in the frequency ...
• #### Characterizing the impact of network latency on cloud-based applications’ performance ﻿

(Computer Laboratory technical reports, 2017-11-30)
Businesses and individuals run increasing numbers of applications in the cloud. The performance of an application running in the cloud depends on the data center conditions and upon the resources committed to an application. ...
• #### CHERI JNI: Sinking the Java security model into the C ﻿

Java provides security and robustness by building a high-level security model atop the foundation of memory protection. Unfortunately, any native code linked into a Java program – including the million lines used to implement ...
• #### CHERI JNI: Sinking the Java Security Model into the C ﻿

(ACM, 2017-06)
Java provides security and robustness by building a high- level security model atop the foundation of memory protection. Unfortunately, any native code linked into a Java program – including the million lines used to ...
• #### CHERI: A Hybrid Capability-System Architecture for Scalable Software Compartmentalization ﻿

(IEEE, 2015-05-26)
CHERI extends a conventional RISC Instruction- Set Architecture, compiler, and operating system to support fine-grained, capability-based memory protection to mitigate memory-related vulnerabilities in C-language TCBs. We ...
• #### Citation Block Determination using Textual Coherence ﻿

(2016-05-15)
• #### ClassBench-ng: Recasting ClassBench After a Decade of Network Evolution ﻿

(IEEE, 2017-05-18)
Internet evolution is driven by a continuous stream of new applications and users driving the demand for services. To keep up with this, a never-stopping research has been transforming the Internet ecosystem over the time. ...
• #### Classical Logic with Mendler Induction: A Dual Calculus and Its Strong Normalization ﻿

(Springer, 2015-12-10)
We investigate (co-)induction in Classical Logic under the propositions-as-types paradigm, considering propositional, second-order, and (co-)inductive types. Specifically, we introduce an extension of the Dual Calculus ...
• #### Cloud computing for small business: Criminal and security threats and prevention measures ﻿

(Australian Institute of Criminology, 2013)
Cloud computing refers to the delivery of computer processing infrastructure, operating systems, software and data storage over Internet-based public or private computer networks. The aim is to relieve users of some of the ...
• #### Collapsing Towers of Interpreters ﻿

(Association of Computing Machinery, 2017-12-27)
Given a tower of interpreters, i.e., a sequence of multiple interpreters interpreting one another as input programs, we aim to collapse this tower into a compiler that removes all interpretive overhead and runs in a single ...
• #### Combining Effects and Coeffects via Grading ﻿

(Association for Computing Machinery, 2016)
$\textit{Effects}$ and $\textit{coeffects}$ are two general, complementary aspects of program behaviour. They roughly correspond to computations which change the execution context (effects) versus computations which make ...
• #### Combining manual rules and supervised learning for hedge cue and scope detection ﻿

(ACL, Association for Computational Linguistics, 2010-12-01)
Hedge cues were detected using a supervised Conditional Random Field (CRF) classifier exploiting features from the RASP parser. The CRF’s predictions were filtered using known cues and unseen instances were removed, ...