The majority of work on protection in single-language mobile code environments focuses on information security issues and depends on the language environment for solutions to the ...
We introduce a technique for detecting anomalous patterns in a categorical feature (one that takes values from a finite alphabet). It differs from most anomaly detection methods u...
Often remote investigations use autonomous agents to observe an environment on behalf of absent scientists. Predictive exploration improves these systems’ efficiency with onboa...
The responses of cortical neurons are often characterized by measuring their spectro-temporal receptive fields (strfs). The strf of a cell can be thought of as a representation of...
Martin Coath, Emili Balaguer-Ballester, Sue L. Den...
ser provides abstraction for supporting flexible security policies that can be developed using the low-level primitives of the browser. We believe our browser architecture will be ...