We examine the robustness of critical infrastructure networks in the face of terrorist attack, using a simulation experiment that incorporates link capacity; and an extension of d...
Abstract. We present attacks on the anonymity and pseudonymity provided by a “lonely hearts” dating service and by the HushMail encrypted email system. We move on to discuss so...
We describe a class of causal, discrete latent variable models called Multiple Multiplicative Factor models (MMFs). A data vector is represented in the latent space as a vector of...
Many object-oriented toolkits and frameworks for groupware development provide shared objects as a basic service. This relieves developers of a lot of problems originating from th...
Abstract. In recent years, personalized news recommendation has received increasing attention in IR community. The core problem of personalized recommendation is to model and track...