Abstract—Audit mechanisms are essential for privacy protection in permissive access control regimes, such as in hospitals where denying legitimate access requests can adversely a...
Jeremiah Blocki, Nicolas Christin, Anupam Datta, A...
Dedicated computing clusters are typically sized based on an expected average workload over a period of years, rather than on peak workloads, which might exist for relatively shor...
Michael Mattess, Christian Vecchiola, Rajkumar Buy...
We present evidence that, in some research fields, research published in journals and reported on the Web may collectively represent different evolutionary stages of the field wit...
We connect measures of public opinion measured from polls with sentiment measured from text. We analyze several surveys on consumer confidence and political opinion over the 2008 ...
Focusing on examples of knowledge systems and machine learning, this paper illustrates the transfer of AI technology from science to real-world applications. Decades of AI researc...
Armin B. Cremers, Sebastian Thrun, Wolfram Burgard