Access control is the problem of regulating access to secret information based on certain context information. In traditional applications, context information is known exactly, p...
Abstract. This paper describes the technique for translation of character n-grams we developed for our participation in CLEF 2006. This solution avoids the need for word normalizat...
This paper shows how to use a text retrieval and an image retrieval engine in a cooperative way. The proposed Inter-Media PseudoRelevance Feedback approach shows how the image moda...
Nicolas Maillot, Jean-Pierre Chevallet, Joo-Hwee L...
The simulated evaluation of memory management policies relies on reference traces—logs of memory operations performed by running processes. No existing approach to reference tra...
Geo-ontologies have a key role to play in the development of the geospatial-semantic web, with regard to facilitating the search for geographical information and resources. They no...
Philip D. Smart, Alia I. Abdelmoty, Baher A. El-Ge...