Ubiquitous computing promises to enable new classes of application. In this paper, we present research intended to accelerate the exploration of the space of possible application ...
INEX has through the years provided two types of queries: Content-Only queries (CO) and Content-And-Structure queries (CAS). The CO language has not changed much, but the CAS lang...
Abstract. This paper describes two methodologies for performing distributed particle filtering in a sensor network. It considers the scenario in which a set of sensor nodes make m...
: In this paper we present our work on applying Belief Augmented Frames to the text classification problem. We formulate the problem in two alternative ways, and we evaluate the pe...
abstract February 6, 2004 Security protocols typically employ an authentication phase followed by a protected data exchange. In some cases, such TLS, these two phases are tightly ...