Future Concepts division- publications
-
TBL-improved non-deterministic segmentation and POS tagging for a Chinese parser
We present an experiment in improving the output of an off-the-shelf module that performs segmentation and tagging, the tokenizer-tagger from Beijing University (PKU).
-
Human evaluation of a German surface realisation ranker
In this paper we present a human-based evaluation of surface realisation alternatives.
-
Isolines: efficient spatio-temporal data aggregation in sensor networks
This paper introduces an energy-efficient data collection technique that takes advantage of spatial and temporal data correlation for monitoring continuously changing conditions such as temperature, humidity, rain fall, radiation, substance…
-
Embracing interference in ad hoc networks using joint routing and scheduling with multiple packet reception
We present an approach that takes advantage of multi-packet reception (MPR) to reduce the negative effects of multiple access interference and therefore increase the capacity of an ad hoc network.
-
Embracing interference in ad hoc networks using joint routing and scheduling with multiple packet reception
We present an approach that takes advantage of multi-packet reception (MPR) to reduce the negative effects of multiple access interference and therefore increase the capacity of an ad hoc network.
-
Powers of 10: modeling complex information-seeking systems at multiple scales
New models of information-seeking support systems offer two advantages: they move us from prescientific conceptual frameworks about information seeking to more rigorous scientific theories and predictive models while, at the…
-
Learning by Reading: Normalizing complex linguistic structures onto a knowledge representation
This brief position paper illustrates the power of this approach in PARCs Bridge system through examples of textual inference.
-
Predicate privacy in encryption systems
In this paper, we consider a new notion called predicate privacy, that is, the property that a token should not reveal information about the query predicate encoded in it.
-
Holding on and letting go: facts, counterfactuals and before
-
Learning situation models in a smart home
This article addresses the problem of learning situation models for providing context-aware services.
-
13th International Conference on Financial Cryptography and Data Security (FC 2009)
The following topics in information security were discussed: information security economics, anonymity and privacy, private computation, authentication and identification, passwords, fraud detection, cryptographic applications, etc.
-
Micro-fluidic-based flow cytometer for point-of-care applications based on a spatial modulation technique
In this presentation we will describe and illustrate a fundamentally new design of the optical detection system that delivers high effective sensitivity (i.e., high signal to noise discrimination) without complex…