Data confidentiality is a major concern in database systems. Encryption is a useful tool for protecting the confidentiality of sensitive data. However, when data is encrypted, perf...
Recent email spam filtering evaluations, such as those conducted at TREC, have shown that near-perfect filtering results are attained with a variety of machine learning methods wh...
A constrained agent is limited in the actions that it can take at any given time, and a challenging problem is to design policies for such agents to do the best they can despite t...
: From the least to most prominent elements, documents are arranged in a tacit visual hierarchy. This is essential for document scanning and comprehension. This conceptual structur...
Helen Balinsky, Anthony Wiley, Michael Rhodes, Alf...
Service-Orientation (SO) is a design and integration paradigm that is based on the notion of well defined, loosely coupled services. Within SO, services are viewed as computation...