A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2022; you can also visit the original URL.
The file type is application/pdf
.
Filters
Burkhard Emme: Peristyl und Polis. Entwicklung und Funktionen öffentlicher griechi-scher Hofhallen
2017
Gnomon. Kritische Zeitschrift für die gesamte klassische Altertumswissenschaft
Viel- mehr stehen einige grundlegende Resultate zur Debatte, die sich auf die drei * Burkhard Emme: Peristyl und Polis. Entwicklung und Funktionen öffentlicher griechischer Hofhallen. ...
In seiner Heidelberger Dissertation 'Peristyl und Polis' hat es sich Burkard Emme (im folgenden E.) zur Aufgabe gemacht, der Funktion von öffentlichen Peristylen nachzuspüren, «(...) im einzelnen sowie ...
doi:10.17104/0017-1417-2017-5-442
fatcat:u5y67g7tpjee5ih4unhmo3thoq
Dynamic EM in Neologism Evolution
[chapter]
2013
Lecture Notes in Computer Science
Research on unsupervised word sense discrimination typically ignores a notable dynamic aspect, whereby the prevalence of a word sense varies over time, to the point that a given word (such as 'tweet') can acquire a new usage alongside a pre-existing one (such as 'a Twitter post' alongside 'a bird noise'). This work applies unsupervised methods to text collections within which such neologisms can reasonably be expected to occur. We propose a probabilistic model which conditions words on senses,
doi:10.1007/978-3-642-41278-3_35
fatcat:25zei7bewfaipfbonoxrfjncyu
more »
... nd senses on times and an EM method to learn the parameters of the model using data from which sense labels have been deleted. This is contrasted with a static model with no time dependency. We show qualitatively that the learned and the observed time-dependent sense distributions resemble each other closely, and quantitatively that the learned dynamic model achieves a higher tagging accuracy (82.4%) than the learned static model does (76.1%).
Group A streptococcal Vir types are M-protein gene (emm) sequence type specific
1998
Journal of Clinical Microbiology
Diversity in the emm sequence was generated by corrected frameshift mutations, point mutations, and small in-frame mutations. ...
By using both HaeIII and HinfI to generate RFLP profiles, complete concordance between Vir type and emm sequence type was found. ...
one distinct emm ST. ...
pmid:9542906
pmcid:PMC104658
fatcat:rae4cyx5f5g4ri6sas7rrjs2ne
International circumpolar surveillance interlaboratory quality control program for emm typing of Streptococcus pyogenes, 2011–2015
2016
Diagnostic microbiology and infectious disease
From 2011 -2015, 35 GAS isolates were distributed to three laboratories; emm type-level concordance was 100%, while the overall sub-type level concordance was 83%. ...
In 2011, an interlaboratory quality control (QC) program for emm typing group A streptococci (GAS) was incorporated into existing international circumpolar surveillance QC programs. ...
We also wish to acknowledge the use of the CDC emm database curated by Velusamy Srinivasan. ...
doi:10.1016/j.diagmicrobio.2016.05.005
pmid:27238635
pmcid:PMC5704931
fatcat:iyn7emwcq5e7bo3hljivz2abvq
emm Typing and Validation of Provisional M Types for Group A Streptococci1
1999
Emerging Infectious Diseases
This report discusses the following issues related to typing of group A streptococci (GAS): The development and use of the 5' emm variable region sequencing (emm typing) in relation to the existing serologic ...
typing system; the designation of emm types in relation to M types; a system for validation of new emm types; criteria for validation of provisional M types to new M-types; a list of reference type cultures ...
A third category are sequence types or emm types, which are strains typed by sequencing the emm gene. If cultures are identified by emm sequencing, they should be reported as emm type. ...
doi:10.3201/eid0502.990209
pmid:10221877
pmcid:PMC2640698
fatcat:6lervhyhrfbdpbx6kx775are4e
Detecting change and emergence for multiword expressions
2014
Proceedings of the 10th Workshop on Multiword Expressions (MWE)
Building on earlier work (Emms, 2013), we present some work concerning unsupervised means to detect this. ...
There has been some work on algorithms which seek to quantify the degree of compositionality of particular n-grams (Maldonado-Guerra and Emms, 2011; Biemann and Giesbrecht, 2011) and it is hoped in future ...
doi:10.3115/v1/w14-0815
dblp:conf/mwe/EmmsJ14
fatcat:nbtnjm6bgbfjrbb52lolspqd2q
Risks of Offline Verify PIN on Contactless Cards
[chapter]
2013
Lecture Notes in Computer Science
Contactless card payments are being introduced around the world allowing customers to use a card to pay for small purchases by simply placing the card onto the Point of Sale terminal. Contactless transactions do not require verification of the cardholder's PIN. However our research has found the redundant verify PIN functionality is present on the most commonly issued contactless credit and debit cards currently in circulation in the UK. This paper presents a plausible attack scenario which
doi:10.1007/978-3-642-39884-1_26
fatcat:apypnfzj2jh2xnfkhp6fqohp6q
more »
... oits contactless verify PIN to give unlimited attempts to guess the cardholder's PIN without their knowledge. It also gives experimental data to demonstrate the practical viability of the attack as well as references to support our argument that contactless verify PIN is redundant functionality which compromises the security of payment cards and the cardholder. Abstract Contactless card payments are being introduced around the world allowing customers to use a card to pay for small purchases by simply placing the card onto the Point of Sale terminal. Contactless transactions do not require verification of the cardholder's PIN. However our research has found the redundant verify PIN functionality is present on the most commonly issued contactless credit and debit cards currently in circulation in the UK. This paper presents a plausible attack scenario which exploits contactless verify PIN to give unlimited attempts to guess the cardholder's PIN without their knowledge. It also gives experimental data to demonstrate the practical viability of the attack as well as references to support our argument that contactless verify PIN is redundant functionality which compromises the security of payment cards and the cardholder.
Extending the type checker of Standard ML by polymorphic recursion
1999
Theoretical Computer Science
We describe an extension of the type inference of Standard ML that covers polymorphic recursion. For any term t of SML, a type scheme r and a system L of inequations between (simple) types is computed, such that the types of t are the instances of 7 by substitutions S that satisfy L. Both the inequation constraints L and their principal solutions are computed bottom-up in a modification of Milner's algorithm W. The correctness proof is complicated by the fact that (a) semiunification -unlike
doi:10.1016/s0304-3975(98)00139-x
fatcat:p7jgpz3dzfb3nhehfcenr4tpaq
more »
... fication -generally does not allow one to refine a solution by composition with an arbitrary substitution and (b) a more restrictive criterion for introducing quantifiers in types of let-bound variables is needed.
Sensible Privacy
2014
Proceedings of the 13th Workshop on Privacy in the Electronic Society - WPES '14
Privacy is a concept with real life ties and implications. Privacy infringement has the potential to lead to serious consequences for the stakeholders involved, hence researchers and organisations have developed various privacy enhancing techniques and tools. However, there is no solution that fits all, and there are instances where privacy solutions could be misused, for example to hide nefarious activities. Therefore, it is important to provide suitable measures and to make necessary design
doi:10.1145/2665943.2665965
dblp:conf/wpes/AriefCEM14
fatcat:fmhch4bvnjglbfd7fdeqhqnhcm
more »
... adeoffs in order to avoid such misuse. This short paper aims to make a case for the need of careful consideration when designing a privacy solution, such that the design effectively addresses the user requirements while at the same time minimises the risk of inadvertently assisting potential offenders. In other words, this paper strives to promote Òsensible privacyÓ design, which deals with the complex challenges in balancing privacy, usability and accountability. We illustrate this idea through a case study involving the design of privacy solutions for domestic violence survivors. This is the main contribution of the paper. The case study presents specific user requirements and operating conditions, which coupled with the attacker model, provide a complex yet interesting scenario to explore. One example of our solutions is described in detail to demonstrate the feasibility of our approach.
Impacts of a large flood along a mountain river basin: unravelling the geomorphic response and large wood budget in the upper Emme River (Switzerland)
2018
Earth Surface Dynamics Discussions
On July 24, 2014, an exceptionally large flood (recurrence interval ca. 150 years) caused large-scale inundations, severe overbank sedimentation and damage to infrastructures and buildings along the Emme ...
However, we also observed that extending the analysis to the whole upper catchment of the Emme river, including all the tributaries and not only to the most affected zones, resulted in a different set ...
Large wood deposition along the Emme River 491 LW deposits were analysed along the Emme River and its tributary Sädelgrabe. ...
doi:10.5194/esurf-2018-44
fatcat:wgrdn46weravxh3jfkdpqcfnyy
Electronic Footprints in the Sand: Technologies for Assisting Domestic Violence Survivors
[chapter]
2014
Lecture Notes in Computer Science
With the rapid growth and spread of Internet-based social support systems, the impact that these systems can make to society -be it good or badhas become more significant and can make a real difference to people's lives. As such, various aspects of these systems need to be carefully investigated and analysed, including their security/privacy issues. In this paper, we present our work in designing and implementing various technological features that can be used to assist domestic violence
doi:10.1007/978-3-642-54069-1_13
fatcat:wcpslzlxencotdhb3s7q34vule
more »
... rs in obtaining help without leaving traces which might lead to further violence from their abuser. This case study serves as the core of our paper, in which we outline our approach, various design considerations -including difficulties in keeping browsing history private, our currently implemented solutions (single use URL, targeted history sanititation agent, and secret graphical gateway), as well as novel ideas for future work (including location-based service advertising and deployment in the wild).
Impacts of a large flood along a mountain river basin: the importance of channel widening and estimating the large wood budget in the upper Emme River (Switzerland)
2018
Earth Surface Dynamics
> On 24 July 2014, an exceptionally large flood (recurrence interval ca. 150 years) caused large-scale inundations, severe overbank sedimentation, and damage to infrastructure and buildings along the Emme ...
However, we also observed that extending the analysis to the whole upper catchment of the Emme River by including all the tributaries and not only to the most affected zones resulted in a different set ...
This study was funded by the Federal Office for the Environment (FOEN) in the framework of the "Large Wood during the July 2014 Emme Flood Project" (00.0157.PZ/N414-1285) and the "Research Project WoodFlow ...
doi:10.5194/esurf-6-1115-2018
fatcat:m7un6qe4njgntfrop3jht7h6e4
Does the Online Card Payment Landscape Unwittingly Facilitate Fraud?
2017
IEEE Security and Privacy
To protect the affected sites, Mohammed Aamir Ali, Budi Arief, Martin Emms, and Aad van Moorsel C we refrain from specifically revealing their names and their vulnerabilities. ...
doi:10.1109/msp.2017.27
fatcat:wp4wmfnpsvh6jbhajxb62cdwwa
Proving Termination of Programs Automatically with AProVE
[chapter]
2014
Lecture Notes in Computer Science
AProVE is a system for automatic termination and complexity proofs of Java, C, Haskell, Prolog, and term rewrite systems (TRSs). To analyze programs in high-level languages, AProVE automatically converts them to TRSs. Then, a wide range of techniques is employed to prove termination and to infer complexity bounds for the resulting TRSs. The generated proofs can be exported to check their correctness using automatic certifiers. For use in software construction, we present an AProVE plug-in for
doi:10.1007/978-3-319-08587-6_13
fatcat:7wpvmvkp6jhhxey7ornjsfwfgm
more »
... e popular Eclipse software development environment.
TCDSCSS: Dimensionality Reduction to Evaluate Texts of Varying Lengths - an IR Approach
2014
Proceedings of the 8th International Workshop on Semantic Evaluation (SemEval 2014)
organizers
Here, the dimension X% means k = (X/100) × N , where N is the total number of columns in A in the unreduced SVD.4 Stemmed using Porter Stemmer module availabe from http://tartarus.org/∼martin ...
doi:10.3115/v1/s14-2109
dblp:conf/semeval/JayapalEK14
fatcat:5w5dhs54inbh7eqfvgby6dwc7q
« Previous
Showing results 1 — 15 out of 5,199 results