Access control is one of the most important security mechanisms in cloud computing. However, there has been little work that explores various comparison-based constraints for regu...
Yan Zhu, Hongxin Hu, Gail-Joon Ahn, Mengyang Yu, H...
This paper describes a tunably-difficult problem for genetic programming (GP) that probes for limits to building block mixing and assembly. The existence of such a problem can be ...
Jason M. Daida, Michael E. Samples, Matthew J. Byo...
We have implemented a novel peer-to-peer based environment called Comtella, which allows students to contribute and share class-related resources. This system has been implemented ...
Argumentation is modelled as a game where the payoffs are measured in terms of the probability that the claimed conclusion is, or is not, defeasibly provable, given a history of a...
An approach for a program is presented that automatically detects the position of pitch accents and intonation phrase (IP) boundaries from waveforms. The technique maps acoustic c...