default search action
John C. Henderson
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [c35]Elizabeth M. Merkhofer, John C. Henderson, Abigail S. Gertner, Michael Doyle, Lily Wong:
Practical Attacks on Machine Translation using Paraphrase. AMTA 2022: 227-239 - 2021
- [c34]Elizabeth M. Merkhofer, Monica-Ann Mendoza, Rebecca Marvin, John C. Henderson:
Perceptual Models of Machine-Edited Text. ACL/IJCNLP (Findings) 2021: 3909-3920
2010 – 2019
- 2019
- [c33]Abigail S. Gertner, John C. Henderson, Elizabeth M. Merkhofer, Amy Marsh, Ben Wellner, Guido Zarrella:
MITRE at SemEval-2019 Task 5: Transfer Learning for Multilingual Hate Speech Detection. SemEval@NAACL-HLT 2019: 453-459 - 2018
- [c32]Elizabeth M. Merkhofer, John C. Henderson, David Bloom, Laura Strickhart, Guido Zarrella:
MITRE at SemEval-2018 Task 11: Commonsense Reasoning without Commonsense Knowledge. SemEval@NAACL-HLT 2018: 1078-1082 - 2017
- [c31]John C. Henderson, Elizabeth M. Merkhofer, Laura Strickhart, Guido Zarrella:
MITRE at SemEval-2017 Task 1: Simple Semantic Similarity. SemEval@ACL 2017: 185-190 - 2015
- [c30]Guido Zarrella, John C. Henderson, Elizabeth M. Merkhofer, Laura Strickhart:
MITRE: Seven Systems for Semantic Similarity in Tweets. SemEval@NAACL-HLT 2015: 12-17 - 2013
- [c29]John C. Henderson, Guido Zarrella, Craig Pfeifer, John D. Burger:
Discriminating Non-Native English with 350 Words. BEA@NAACL-HLT 2013: 101-110 - 2012
- [j17]Bala Iyer, John C. Henderson:
Business Value from Clouds: Learning from Users. MIS Q. Executive 11(1): 7 (2012) - [c28]Christine Doran, Guido Zarrella, John C. Henderson:
Navigating Large Comment Threads with CoFi. HLT-NAACL 2012: 9-12 - 2011
- [c27]John D. Burger, John C. Henderson, George Kim, Guido Zarrella:
Discriminating Gender on Twitter. EMNLP 2011: 1301-1309 - 2010
- [j16]Bala Iyer, John C. Henderson:
Preparing for the Future: Understanding the Seven Capabilities of Cloud Computing. MIS Q. Executive 9(2): 6 (2010)
2000 – 2009
- 2008
- [c26]James B. Freedman, John C. Henderson:
Digital Usage Behavior: A Sense Making Perspective. HICSS 2008: 125 - 2006
- [j15]Stephanie Watts, John C. Henderson:
Innovative IT climates: CIO perspectives. J. Strateg. Inf. Syst. 15(2): 125-151 (2006) - [c25]John D. Burger, John C. Henderson:
An Exploration of Observable Features Related to Blogger Age. AAAI Spring Symposium: Computational Approaches to Analyzing Weblogs 2006: 15-20 - [c24]Christine Doran, John Griffith, John C. Henderson:
Highlights from 12 Months of Blogs. AAAI Spring Symposium: Computational Approaches to Analyzing Weblogs 2006: 30-33 - 2005
- [c23]John C. Henderson, William T. Morgan:
Gaming Fluency: Evaluating the Bounds and Expectations of Segment-based Translation Memory. ParallelText@ACL 2005: 175-182 - [c22]Samuel Bayer, John D. Burger, Lisa Ferro, John C. Henderson, Lynette Hirschman, Alexander S. Yeh:
Evaluating Semantic Evaluations: How RTE Measures Up. MLCW 2005: 309-331 - 2004
- [c21]Laurie E. Damianos, Samuel Bayer, Michael Chisholm, John C. Henderson, Lynette Hirschman, William T. Morgan, Marc Ubaldino, Guido Zarrella, James M. Wilson V, Marat G. Polyak:
MiTAP for SARS Detection. HLT-NAACL (Demonstration Papers) 2004 - [c20]William T. Morgan, Warren R. Greiff, John C. Henderson:
Direct Maximization of Average Precision by Hill-Climbing, with a Comparison to a Maximum Entropy Approach. HLT-NAACL (Short Papers) 2004 - 2003
- [c19]John D. Burger, John C. Henderson:
Exploiting Diversity for Answering Questions. HLT-NAACL 2003 - [c18]John C. Henderson:
Word Alignment Baselines. ParallelTexts@NAACL-HLT 2003 - 2002
- [c17]John D. Burger, John C. Henderson, William T. Morgan:
Statistical Named Entity Recognizer Adaptation. CoNLL 2002 - [c16]Christine M. A. Lentz, Janis L. Gogan, John C. Henderson:
A Comprehensive and Cohesive IT Value Management Capability: Case Studies in the North American Life Insurance Industry. HICSS 2002: 243 - [c15]John D. Burger, Lisa Ferro, Warren R. Greiff, John C. Henderson, Scott A. Mardis, Alexander A. Morgan, Marc Light:
MITRE's Qanda at TREC-11. TREC 2002 - 2001
- [j14]Salvatore Parise, John C. Henderson:
Knowledge resource exchange in strategic alliances. IBM Syst. J. 40(4): 908-924 (2001) - [c14]Lynette Hirschman, Kris Concepcion, Laurie E. Damianos, David Day, John Delmore, Lisa Ferro, John Griffith, John C. Henderson, Jeffrey L. Kurtz, Inderjeet Mani, Scott A. Mardis, Tom McEntee, Keith Miller, Beverly Nunam, Jay M. Ponte, Florence Reeder, Ben Wellner, George Wilson, Alexander S. Yeh:
Integrated Feasibility Experiment for Bio-Security: IFE-Bio, A TIDES Demonstration. HLT 2001 - [i4]Radu Florian, John C. Henderson, Grace Ngai:
Coaxing Confidences from an Old Friend: Probabilistic Classifications from Transformation Rule Lists. CoRR cs.CL/0104020 (2001) - 2000
- [c13]John C. Henderson, Eric Brill:
Bagging and Boosting a Treebank Parser. ANLP 2000: 34-41 - [c12]Radu Florian, John C. Henderson, Grace Ngai:
Coaxing Confidences from an Old Freind: Probabilistic Classifications from Transformation Rule Lists. EMNLP 2000: 26-34 - [c11]Eric Brill, John C. Henderson, Grace Ngai:
Automatic Grammar Induction: Combining, Reducing and Doing Nothing. IWPT 2000: 1-5 - [i3]John C. Henderson, Eric Brill:
Exploiting Diversity in Natural Language Processing: Combining Parsers. CoRR cs.CL/0006003 (2000) - [i2]John C. Henderson, Eric Brill:
Bagging and Boosting a Treebank Parser. CoRR cs.CL/0006011 (2000) - [i1]John C. Henderson:
Exploiting Diversity for Natural Language Parsing. CoRR cs.CL/0006012 (2000)
1990 – 1999
- 1999
- [j13]P. R. Balasubramanian, Kumar Nochur, John C. Henderson, M. Millie Kwan:
Managing process knowledge for decision support. Decis. Support Syst. 27(1-2): 145-162 (1999) - [j12]John C. Henderson, N. Venkatraman:
Strategic Alignment: Leveraging Information Technology for Transforming Organizations. IBM Syst. J. 38(2/3): 472-484 (1999) - [c10]John C. Henderson, Eric Brill:
Exploiting Diversity in Natural Language Processing: Combining Parsers. EMNLP 1999 - 1998
- [j11]Steven Salzberg, Arthur L. Delcher, Kenneth H. Fasman, John C. Henderson:
A Decision Tree System for Finding Genes in DNA. J. Comput. Biol. 5(4): 667-680 (1998) - [c9]John C. Henderson:
Exploiting Diversity for Natural Language Processing. AAAI/IAAI 1998: 1174 - [c8]Eric Brill, Radu Florian, John C. Henderson, Lidia Mangu:
Beyond N-Grams: Can Linguistic Sophistication Improve Language Modeling? COLING-ACL 1998: 186-190 - 1997
- [j10]John C. Henderson, Steven Salzberg, Kenneth H. Fasman:
Finding Genes in DNA with a Hidden Markov Model. J. Comput. Biol. 4(2): 127-141 (1997) - [c7]Giorgio Satta, John C. Henderson:
String Transformation Learning. ACL 1997: 444-451 - 1996
- [j9]John C. Henderson, Christine M. A. Lentz:
Learning, Working, and Innovation: A Case Study in the Insurance Industry. J. Manag. Inf. Syst. 12(3): 43-64 (1996) - [c6]Steven Salzberg, Xin Chen, John C. Henderson, Kenneth H. Fasman:
Finding Genes in DNA Using Decision Trees and Dynamic Programming. ISMB 1996: 201-210 - 1995
- [c5]John C. Henderson, Christine M. A. Lentz:
Learning, working and innovation: a case study in insurance. HICSS (4) 1995: 546-555 - [c4]Suzanne Iacono, Mani R. Subramani, John C. Henderson:
Entrepreneur or Intermediary: The Nature of the Relationship Manager's Job. ICIS 1995: 289-299 - 1993
- [j8]John C. Henderson, N. Venkatraman:
Strategic Alignment: Leveraging Information Technology for Transforming Organizations. IBM Syst. J. 32(1): 4-16 (1993) - [c3]Richard J. Boland Jr., Gerardine DeSanctis, John C. Henderson, Blake Ives, John Leslie King:
Meet the Editors. ICIS 1993: 424 - 1992
- [c2]John C. Henderson, Benn R. Konsynski, Robert W. Zmud:
Alternative Arrangements for the Management of Information Services: Implications for Practitioners and Academics. ICIS 1992: 282 - 1991
- [j7]Jay G. Cooprider, John C. Henderson:
Technology-Process Fit: Perspectives on Achieving Prototyping Effectiveness. J. Manag. Inf. Syst. 7(3): 67-88 (1991) - 1990
- [j6]John C. Henderson, Jay G. Cooprider:
Dimensions of I/S Planning and Design Aids: A Functional Model of CASE Technology. Inf. Syst. Res. 1(3): 227-254 (1990)
1980 – 1989
- 1989
- [e1]Janice I. DeGross, John C. Henderson, Benn R. Konsynski:
Proceedings of the 10th International Conference on Information Systems, ICIS 1989, Boston, Massachusetts, USA, 1989. Association for Information Systems 1989 [contents] - 1988
- [j5]John C. Henderson, John G. Sifonis:
The Value of Strategic IS Planning: Understanding Consistency, Validity, and IS Markets. MIS Q. 12(2): 187-200 (1988) - 1987
- [j4]John C. Henderson, John F. Rockart, John G. Sifonis:
Integrating Management Support Systems into Strategic Information Systems Planning. J. Manag. Inf. Syst. 4(1): 5-24 (1987) - 1985
- [j3]John C. Henderson, David A. Schilling:
Design and Implementation of Decision Support Systems in the Public Sector. MIS Q. 9(2): 157-169 (1985) - 1983
- [j2]Joyce J. Elam, John C. Henderson:
Knowledge engineering concepts for decision support system design and implementation. Inf. Manag. 6(2): 109-114 (1983) - 1980
- [c1]Joyce J. Elam, John C. Henderson, Louis W. Miller:
Model Management Systems: an Approach to Decision Support in Complex Organizations. ICIS 1980: 8
1970 – 1979
- 1979
- [j1]John C. Henderson, John M. West Jr.:
Planning for MIS: A Decision-Oriented Approach. MIS Q. 3(2): 45-58 (1979)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:23 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint