—Anomaly detection methods typically operate on pre-processed, i.e., sampled and aggregated, traffic traces. Most traffic capturing devices today employ random packet sampling,...
: HP Transforms Product Portfolio Management with Operations Research Julie Ward, Bin Zhang, Shailendra Jain, Chris Fry, Thomas Olavson, Holger Mishal, Jason Amaral, Dirk Beyer...
Julie Ward, Bin Zhang, Shailendra Jain, Chris Fry,...
We present DCL-PC: a logic for reasoning about how the abilities of agents and coalitions of agents are altered by transferring control from one agent to another. The logical foun...
Wiebe van der Hoek, Dirk Walther, Michael Wooldrid...
■ Selection between competing responses and stimulus-response association strength is thought to affect performance during verb generation. However, the specific contribution of...
Cristiano Crescentini, Tim Shallice, Emiliano Maca...
We describe M4, the multi-modal mesh manipulation system, which aims to provide a more intuitive desktop interface for freeform manipulation of 3D meshes. The system combines inte...
Adam Faeth, Michael Oren, Jonathan Sheller, Sean G...