Searched for Maria Roussou  [new search]  [edit/save query]  [advanced search]
Searched The ACM Full-Text Collection: 569,850 records   [Expand your search to The ACM Guide to Computing Literature: 2,871,578 records] Help: ACM vs. Guide
Refinements  [remove all]  click each refinement below to remove
Institutions: University of Edinburgh
117 results found
Export Results: bibtexendnoteacmrefcsv

Refine by People
Names show/hide
Institutions show/hide
Authors show/hide
Reviewers show/hide
Refine by Publications
Publication Names show/hide
ACM Publications show/hide
All Publications show/hide
Content Formats show/hide
Publishers show/hide
Refine by Conferences
Sponsors show/hide
Events show/hide
Proceeding Series show/hide
Refine by Publication Year
1998
Result 1 – 20 of 117
Result page: 1 2 3 4 5 6

Sort by:

1 published by ACM
April 2014 CHI EA '14: CHI '14 Extended Abstracts on Human Factors in Computing Systems
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 8,   Downloads (12 Months): 42,   Downloads (Overall): 291

Full text available: PDFPDF
Remembering to take one's medication on time is hard work. This is true for younger people with no chronic illness as well as older people with many co-morbid conditions that require a complex medication regime. Many technological solutions have been proposed to help with this problem, but is more IT ...
Keywords: alerts, ehealth, medication, reminders, telecare
[result highlights]

2 published by ACM
October 2016 CCS '16: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 8,   Downloads (12 Months): 57,   Downloads (Overall): 299

Full text available: PDFPDF
eHealth devices such as smart scales and wearable fitness trackers are a key part of many health technology solutions. However, these eHealth devices can be vulnerable to privacy and security related attacks. In this poster, we propose a security analysis framework for eHealth devices, called mH-PriSe, that will yield useful ...
Keywords: eHealth, internet-of-things, wireless & mobile security
[result highlights]

3 published by ACM
May 2012 CHI EA '12: CHI '12 Extended Abstracts on Human Factors in Computing Systems
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 1,   Downloads (12 Months): 12,   Downloads (Overall): 147

Full text available: PDFPDF
Speech reminders can severely disrupt list recall. Spearcons, time-compressed speech messages, might be less disruptive because they are much shorter. In this study, we asked 24 younger participants to recall 64 short lists of digit, animal, food, or furniture names. List items were presented one at a time; the number ...
Keywords: irrelevant speech effect, reminders, spearcon, speech, working memory
[result highlights]

4 published by ACM
May 1998 HYPERTEXT '98: Proceedings of the ninth ACM conference on Hypertext and hypermedia : links, objects, time and space---structure in hypermedia systems: links, objects, time and space---structure in hypermedia systems
Publisher: ACM
Bibliometrics:
Citation Count: 20
Downloads (6 Weeks): 1,   Downloads (12 Months): 1,   Downloads (Overall): 324

Full text available: PDFPDF
[result highlights]

5
June 2005 Software '05: Proceedings of the Workshop on Software
Publisher: Association for Computational Linguistics
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 3,   Downloads (12 Months): 14,   Downloads (Overall): 52

Full text available: PDFPDF
We give a technical description of the fission module of the COMIC multimodal dialogue system, which both plans the multimodal content of the system turns and controls the execution of those plans. We emphasise the parts of the implementation that allow the system to begin producing output as soon as ...
[result highlights]

6
May 2007 RIAO '07: Large Scale Semantic Access to Content (Text, Image, Video, and Sound)
Publisher: LE CENTRE DE HAUTES ETUDES INTERNATIONALES D'INFORMATIQUE DOCUMENTAIRE
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 1,   Downloads (12 Months): 4,   Downloads (Overall): 39

Full text available: PDFPDF
In this paper, we describe some experiments in large-scale Information Extraction (IE) focusing on book texts. We investigate the scalability of IE techniques to full-sized books, and the utility of IE techniques in extracting useful information from fiction. In particular, we evaluate a variety of Named Entity Recognition (NER) techniques ...
[result highlights]

7 published by ACM
June 2003 ICAIL '03: Proceedings of the 9th international conference on Artificial intelligence and law
Publisher: ACM
Bibliometrics:
Citation Count: 4
Downloads (6 Weeks): 1,   Downloads (12 Months): 6,   Downloads (Overall): 689

Full text available: PDFPDF
In an ideal world, a legal knowledge-based system would be evaluated by an evaluator with expertise in both the legal domain and software engineering evaluation processes. However in the real world, this task is typically undertaken by legal professionals, who may lack software engineering expertise. Where software engineers do have ...
Keywords: evaluation, legal knowledge-based systems, validation, verification
[result highlights]

8
June 1999 ACL '99: Proceedings of the 37th annual meeting of the Association for Computational Linguistics on Computational Linguistics
Publisher: Association for Computational Linguistics
Bibliometrics:
Citation Count: 24
Downloads (6 Weeks): 4,   Downloads (12 Months): 23,   Downloads (Overall): 180

Full text available: PDFPDF
This paper examines the extent to which verb diathesis alternations are empirically attested in corpus data. We automatically acquire alternating verbs from large balanced corpora by using partialparsing methods and taxonomic information, and discuss how corpus data can be used to quantify linguistic generalizations. We estimate the productivity of an ...
[result highlights]

9 published by ACM
April 2015 CHI '15: Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems
Publisher: ACM
Bibliometrics:
Citation Count: 0


10 published by ACM
April 2014 CHI '14: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Publisher: ACM
Bibliometrics:
Citation Count: 0


11
June 2003 Computational Linguistics: Volume 29 Issue 2, June 2003
Publisher: MIT Press
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 1,   Downloads (12 Months): 12,   Downloads (Overall): 226

Full text available: PDFPDF
[result highlights]

12 published by ACM
May 2006 AAMAS '06: Proceedings of the fifth international joint conference on Autonomous agents and multiagent systems
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 0,   Downloads (12 Months): 1,   Downloads (Overall): 150

Full text available: PDFPDF
In this paper we present the MAP a language for expressing coordination and communication between agents in multi-agent systems. This is accomplished by defining patterns of dialogues between groups of agents, expressed as protocols. Our protocols are flexible and directly executable. Furthermore, our language allow us to specify the connection ...
[result highlights]

13
September 2002 Computational Linguistics: Volume 28 Issue 3, September 2002
Publisher: MIT Press
Bibliometrics:
Citation Count: 37
Downloads (6 Weeks): 0,   Downloads (12 Months): 3,   Downloads (Overall): 314

Full text available: PDFPDF
This article addresses the interpretation of nominalizations, a particular class of compound nouns whose head noun is derived from a verb and whose modifier is interpreted as an argument of this verb. Any attempt to automatically interpret nominalizations needs to take into account: (a) the selectional constraints imposed by the ...
[result highlights]

14
May 2007 RIAO '07: Large Scale Semantic Access to Content (Text, Image, Video, and Sound)
Publisher: LE CENTRE DE HAUTES ETUDES INTERNATIONALES D'INFORMATIQUE DOCUMENTAIRE
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 1,   Downloads (12 Months): 7,   Downloads (Overall): 42

Full text available: PDFPDF
In this paper, we present the results of an investigation into methodologies and technical solutions for exposing the structured metadata contained within digital qualitative data, to make them more shareable and exploitable. In particular, we develop mechanisms for using Information Extraction (IE) technology to provide user-friendly tools for semi-automating the ...
[result highlights]

15 published by ACM
April 2014 CHI EA '14: CHI '14 Extended Abstracts on Human Factors in Computing Systems
Publisher: ACM
Bibliometrics:
Citation Count: 2
Downloads (6 Weeks): 2,   Downloads (12 Months): 11,   Downloads (Overall): 126

Full text available: PDFPDF
In this paper, we investigate why people decide to delete snapshots. 74 participants took snapshots of a street festival every three minutes for an hour and were then asked to cull pictures immediately or after a delay of a day, a week, or a month. We found that the ratio ...
Keywords: forgetting, photowork, preservation
[result highlights]

16
September 2010 SIGDIAL '10: Proceedings of the 11th Annual Meeting of the Special Interest Group on Discourse and Dialogue
Publisher: Association for Computational Linguistics
Bibliometrics:
Citation Count: 3
Downloads (6 Weeks): 0,   Downloads (12 Months): 3,   Downloads (Overall): 66

Full text available: PDFPDF
Older adults are a challenging user group because their behaviour can be highly variable. To the best of our knowledge, this is the first study where dialogue strategies are learned and evaluated with both simulated younger users and simulated older users. The simulated users were derived from a corpus of ...
[result highlights]

17 published by ACM
May 2017 CHI EA '17: Proceedings of the 2017 CHI Conference Extended Abstracts on Human Factors in Computing Systems
Publisher: ACM
Bibliometrics:
Citation Count: 3
Downloads (6 Weeks): 11,   Downloads (12 Months): 51,   Downloads (Overall): 155

Full text available: PDFPDF
Within Human-Computer Interaction (HCI), researchers have become more aware of the interplay between the work they are doing and their own health and wellbeing. These issues have been discussed mostly in the context of HCI research around sensitive issues (Sensitive HCI). We argue that researcher wellbeing needs to be considered ...
Keywords: codes of good practice, ehealth, emotional labour, research process, researcher wellbeing, sensitive hci
[result highlights]

18 published by ACM
December 2018 EM-5G'18: Proceedings of the Workshop on Experimentation and Measurements in 5G
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 29,   Downloads (12 Months): 264,   Downloads (Overall): 264

Full text available: PDFPDF
While experimental work in the context of 5G has gained significant traction over the past few years, the focus has mainly been on testing the features and capabilities of novel designs and architectures using very simple testbed setups. However, with the emergence of network slicing as a key feature of ...
Keywords: 5G experimentation, 5G networks, prototype 5G testbed
[result highlights]

19 published by ACM
January 2019 Proceedings of the ACM on Programming Languages: Volume 3 Issue POPL, January 2019
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 39,   Downloads (12 Months): 464,   Downloads (Overall): 464

Full text available: PDFPDF
Stan is a probabilistic programming language that has been increasingly used for real-world scalable projects. However, to make practical inference possible, the language sacrifices some of its usability by adopting a block syntax, which lacks compositionality and flexible user-defined functions. Moreover, the semantics of the language has been mainly given ...
Keywords: information flow analysis, probabilistic programming
[result highlights]

20
June 2004 NLPXML '04: Proceeedings of the Workshop on NLP and XML (NLPXML-2004): RDF/RDFS and OWL in Language Technology
Publisher: Association for Computational Linguistics
Bibliometrics:
Citation Count: 12
Downloads (6 Weeks): 2,   Downloads (12 Months): 17,   Downloads (Overall): 58

Full text available: PDFPDF
We describe an approach to text planning that uses the XSLT template-processing engine to create logical forms for an external surface realizer. Using a realizer that can process logical forms with embedded alternatives provides a substitute for backtracking in the text-planning process. This allows the text planner to combine the ...
[result highlights]

Result 1 – 20 of 117
Result page: 1 2 3 4 5 6



The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2019 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us