Filters








5,199 Hits in 1.8 sec

Burkhard Emme: Peristyl und Polis. Entwicklung und Funktionen öffentlicher griechi-scher Hofhallen

Martin Tombrägel
2017 Gnomon. Kritische Zeitschrift für die gesamte klassische Altertumswissenschaft  
Viel- mehr stehen einige grundlegende Resultate zur Debatte, die sich auf die drei * Burkhard Emme: Peristyl und Polis. Entwicklung und Funktionen öffentlicher griechischer Hofhallen.  ...  In seiner Heidelberger Dissertation 'Peristyl und Polis' hat es sich Burkard Emme (im folgenden E.) zur Aufgabe gemacht, der Funktion von öffentlichen Peristylen nachzuspüren, «(...) im einzelnen sowie  ... 
doi:10.17104/0017-1417-2017-5-442 fatcat:u5y67g7tpjee5ih4unhmo3thoq

Dynamic EM in Neologism Evolution [chapter]

Martin Emms
2013 Lecture Notes in Computer Science  
Research on unsupervised word sense discrimination typically ignores a notable dynamic aspect, whereby the prevalence of a word sense varies over time, to the point that a given word (such as 'tweet') can acquire a new usage alongside a pre-existing one (such as 'a Twitter post' alongside 'a bird noise'). This work applies unsupervised methods to text collections within which such neologisms can reasonably be expected to occur. We propose a probabilistic model which conditions words on senses,
more » ... nd senses on times and an EM method to learn the parameters of the model using data from which sense labels have been deleted. This is contrasted with a static model with no time dependency. We show qualitatively that the learned and the observed time-dependent sense distributions resemble each other closely, and quantitatively that the learned dynamic model achieves a higher tagging accuracy (82.4%) than the learned static model does (76.1%).
doi:10.1007/978-3-642-41278-3_35 fatcat:25zei7bewfaipfbonoxrfjncyu

Group A streptococcal Vir types are M-protein gene (emm) sequence type specific

D L Gardiner, A M Goodfellow, D R Martin, K S Sriprakash
1998 Journal of Clinical Microbiology  
Diversity in the emm sequence was generated by corrected frameshift mutations, point mutations, and small in-frame mutations.  ...  By using both HaeIII and HinfI to generate RFLP profiles, complete concordance between Vir type and emm sequence type was found.  ...  one distinct emm ST.  ... 
pmid:9542906 pmcid:PMC104658 fatcat:rae4cyx5f5g4ri6sas7rrjs2ne

International circumpolar surveillance interlaboratory quality control program for emm typing of Streptococcus pyogenes, 2011–2015

Karen Rudolph, Irene Martin, Walter Demczuk, Jocelyne Kakulphimp, Dana Bruden, Tammy Zulz, Michael Bruce
2016 Diagnostic microbiology and infectious disease  
From 2011 -2015, 35 GAS isolates were distributed to three laboratories; emm type-level concordance was 100%, while the overall sub-type level concordance was 83%.  ...  In 2011, an interlaboratory quality control (QC) program for emm typing group A streptococci (GAS) was incorporated into existing international circumpolar surveillance QC programs.  ...  We also wish to acknowledge the use of the CDC emm database curated by Velusamy Srinivasan.  ... 
doi:10.1016/j.diagmicrobio.2016.05.005 pmid:27238635 pmcid:PMC5704931 fatcat:iyn7emwcq5e7bo3hljivz2abvq

emm Typing and Validation of Provisional M Types for Group A Streptococci1

R. Facklam, B. Beall, A. Efstratiou, V. Fischetti, D. Johnson, E. Kaplan, P. Kriz, M. Lovgren, D. Martin, B. Schwartz, A. Totolian, D. Bessen (+4 others)
1999 Emerging Infectious Diseases  
This report discusses the following issues related to typing of group A streptococci (GAS): The development and use of the 5' emm variable region sequencing (emm typing) in relation to the existing serologic  ...  typing system; the designation of emm types in relation to M types; a system for validation of new emm types; criteria for validation of provisional M types to new M-types; a list of reference type cultures  ...  A third category are sequence types or emm types, which are strains typed by sequencing the emm gene. If cultures are identified by emm sequencing, they should be reported as emm type.  ... 
doi:10.3201/eid0502.990209 pmid:10221877 pmcid:PMC2640698 fatcat:6lervhyhrfbdpbx6kx775are4e

Detecting change and emergence for multiword expressions

Martin Emms, Arun Jayapal
2014 Proceedings of the 10th Workshop on Multiword Expressions (MWE)  
Building on earlier work (Emms, 2013), we present some work concerning unsupervised means to detect this.  ...  There has been some work on algorithms which seek to quantify the degree of compositionality of particular n-grams (Maldonado-Guerra and Emms, 2011; Biemann and Giesbrecht, 2011) and it is hoped in future  ... 
doi:10.3115/v1/w14-0815 dblp:conf/mwe/EmmsJ14 fatcat:nbtnjm6bgbfjrbb52lolspqd2q

Risks of Offline Verify PIN on Contactless Cards [chapter]

Martin Emms, Budi Arief, Nicholas Little, Aad van Moorsel
2013 Lecture Notes in Computer Science  
Contactless card payments are being introduced around the world allowing customers to use a card to pay for small purchases by simply placing the card onto the Point of Sale terminal. Contactless transactions do not require verification of the cardholder's PIN. However our research has found the redundant verify PIN functionality is present on the most commonly issued contactless credit and debit cards currently in circulation in the UK. This paper presents a plausible attack scenario which
more » ... oits contactless verify PIN to give unlimited attempts to guess the cardholder's PIN without their knowledge. It also gives experimental data to demonstrate the practical viability of the attack as well as references to support our argument that contactless verify PIN is redundant functionality which compromises the security of payment cards and the cardholder. Abstract Contactless card payments are being introduced around the world allowing customers to use a card to pay for small purchases by simply placing the card onto the Point of Sale terminal. Contactless transactions do not require verification of the cardholder's PIN. However our research has found the redundant verify PIN functionality is present on the most commonly issued contactless credit and debit cards currently in circulation in the UK. This paper presents a plausible attack scenario which exploits contactless verify PIN to give unlimited attempts to guess the cardholder's PIN without their knowledge. It also gives experimental data to demonstrate the practical viability of the attack as well as references to support our argument that contactless verify PIN is redundant functionality which compromises the security of payment cards and the cardholder.
doi:10.1007/978-3-642-39884-1_26 fatcat:apypnfzj2jh2xnfkhp6fqohp6q

Extending the type checker of Standard ML by polymorphic recursion

Martin Emms, Hans Leiβ
1999 Theoretical Computer Science  
We describe an extension of the type inference of Standard ML that covers polymorphic recursion. For any term t of SML, a type scheme r and a system L of inequations between (simple) types is computed, such that the types of t are the instances of 7 by substitutions S that satisfy L. Both the inequation constraints L and their principal solutions are computed bottom-up in a modification of Milner's algorithm W. The correctness proof is complicated by the fact that (a) semiunification -unlike
more » ... fication -generally does not allow one to refine a solution by composition with an arbitrary substitution and (b) a more restrictive criterion for introducing quantifiers in types of let-bound variables is needed.
doi:10.1016/s0304-3975(98)00139-x fatcat:p7jgpz3dzfb3nhehfcenr4tpaq

Sensible Privacy

Budi Arief, Kovila P.L. Coopamootoo, Martin Emms, Aad van Moorsel
2014 Proceedings of the 13th Workshop on Privacy in the Electronic Society - WPES '14  
Privacy is a concept with real life ties and implications. Privacy infringement has the potential to lead to serious consequences for the stakeholders involved, hence researchers and organisations have developed various privacy enhancing techniques and tools. However, there is no solution that fits all, and there are instances where privacy solutions could be misused, for example to hide nefarious activities. Therefore, it is important to provide suitable measures and to make necessary design
more » ... adeoffs in order to avoid such misuse. This short paper aims to make a case for the need of careful consideration when designing a privacy solution, such that the design effectively addresses the user requirements while at the same time minimises the risk of inadvertently assisting potential offenders. In other words, this paper strives to promote Òsensible privacyÓ design, which deals with the complex challenges in balancing privacy, usability and accountability. We illustrate this idea through a case study involving the design of privacy solutions for domestic violence survivors. This is the main contribution of the paper. The case study presents specific user requirements and operating conditions, which coupled with the attacker model, provide a complex yet interesting scenario to explore. One example of our solutions is described in detail to demonstrate the feasibility of our approach.
doi:10.1145/2665943.2665965 dblp:conf/wpes/AriefCEM14 fatcat:fmhch4bvnjglbfd7fdeqhqnhcm

Impacts of a large flood along a mountain river basin: unravelling the geomorphic response and large wood budget in the upper Emme River (Switzerland)

Virginia Ruiz-Villanueva, Alexandre Badoux, Dieter Rickenmann, Martin Böckli, Salome Schläfli, Nicolas Steeb, Markus Stoffel, Christian Rickli
2018 Earth Surface Dynamics Discussions  
On July 24, 2014, an exceptionally large flood (recurrence interval ca. 150 years) caused large-scale inundations, severe overbank sedimentation and damage to infrastructures and buildings along the Emme  ...  However, we also observed that extending the analysis to the whole upper catchment of the Emme river, including all the tributaries and not only to the most affected zones, resulted in a different set  ...  Large wood deposition along the Emme River 491 LW deposits were analysed along the Emme River and its tributary Sädelgrabe.  ... 
doi:10.5194/esurf-2018-44 fatcat:wgrdn46weravxh3jfkdpqcfnyy

Electronic Footprints in the Sand: Technologies for Assisting Domestic Violence Survivors [chapter]

Martin Emms, Budi Arief, Aad van Moorsel
2014 Lecture Notes in Computer Science  
With the rapid growth and spread of Internet-based social support systems, the impact that these systems can make to society -be it good or badhas become more significant and can make a real difference to people's lives. As such, various aspects of these systems need to be carefully investigated and analysed, including their security/privacy issues. In this paper, we present our work in designing and implementing various technological features that can be used to assist domestic violence
more » ... rs in obtaining help without leaving traces which might lead to further violence from their abuser. This case study serves as the core of our paper, in which we outline our approach, various design considerations -including difficulties in keeping browsing history private, our currently implemented solutions (single use URL, targeted history sanititation agent, and secret graphical gateway), as well as novel ideas for future work (including location-based service advertising and deployment in the wild).
doi:10.1007/978-3-642-54069-1_13 fatcat:wcpslzlxencotdhb3s7q34vule

Impacts of a large flood along a mountain river basin: the importance of channel widening and estimating the large wood budget in the upper Emme River (Switzerland)

Virginia Ruiz-Villanueva, Alexandre Badoux, Dieter Rickenmann, Martin Böckli, Salome Schläfli, Nicolas Steeb, Markus Stoffel, Christian Rickli
2018 Earth Surface Dynamics  
> On 24 July 2014, an exceptionally large flood (recurrence interval ca. 150 years) caused large-scale inundations, severe overbank sedimentation, and damage to infrastructure and buildings along the Emme  ...  However, we also observed that extending the analysis to the whole upper catchment of the Emme River by including all the tributaries and not only to the most affected zones resulted in a different set  ...  This study was funded by the Federal Office for the Environment (FOEN) in the framework of the "Large Wood during the July 2014 Emme Flood Project" (00.0157.PZ/N414-1285) and the "Research Project WoodFlow  ... 
doi:10.5194/esurf-6-1115-2018 fatcat:m7un6qe4njgntfrop3jht7h6e4

Does the Online Card Payment Landscape Unwittingly Facilitate Fraud?

Mohammed Aamir Ali, Budi Arief, Martin Emms, Aad van Moorsel
2017 IEEE Security and Privacy  
To protect the affected sites, Mohammed Aamir Ali, Budi Arief, Martin Emms, and Aad van Moorsel C we refrain from specifically revealing their names and their vulnerabilities.  ... 
doi:10.1109/msp.2017.27 fatcat:wp4wmfnpsvh6jbhajxb62cdwwa

Proving Termination of Programs Automatically with AProVE [chapter]

Jürgen Giesl, Marc Brockschmidt, Fabian Emmes, Florian Frohn, Carsten Fuhs, Carsten Otto, Martin Plücker, Peter Schneider-Kamp, Thomas Ströder, Stephanie Swiderski, René Thiemann
2014 Lecture Notes in Computer Science  
AProVE is a system for automatic termination and complexity proofs of Java, C, Haskell, Prolog, and term rewrite systems (TRSs). To analyze programs in high-level languages, AProVE automatically converts them to TRSs. Then, a wide range of techniques is employed to prove termination and to infer complexity bounds for the resulting TRSs. The generated proofs can be exported to check their correctness using automatic certifiers. For use in software construction, we present an AProVE plug-in for
more » ... e popular Eclipse software development environment.
doi:10.1007/978-3-319-08587-6_13 fatcat:7wpvmvkp6jhhxey7ornjsfwfgm

TCDSCSS: Dimensionality Reduction to Evaluate Texts of Varying Lengths - an IR Approach

Arun kumar Jayapal, Martin Emms, John Kelleher
2014 Proceedings of the 8th International Workshop on Semantic Evaluation (SemEval 2014)  
organizers Here, the dimension X% means k = (X/100) × N , where N is the total number of columns in A in the unreduced SVD.4 Stemmed using Porter Stemmer module availabe from http://tartarus.org/∼martin  ... 
doi:10.3115/v1/s14-2109 dblp:conf/semeval/JayapalEK14 fatcat:5w5dhs54inbh7eqfvgby6dwc7q
« Previous Showing results 1 — 15 out of 5,199 results