We track a large set of "rapidly" changing web pages and examine the assumption that the arrival of content changes follows a Poisson process on a microscale. We demonst...
We propose STILL, a signature-free remote exploit binary code injection attack blocker to protect web servers and web applications. STILL is robust to almost all anti-signature, a...
In this paper we describe our mining system which automatically mines tags from feedback text in an eCommerce scenario. It renders these tags in a visually appealing manner. Furth...
Kavita A. Ganesan, Neelakantan Sundaresan, Harshal...
Autonomous robots tend to induce the perception of a personality through their behavior and appearance. It has been suggested that the personality of a robot can be used as a desi...
Bernt Meerbeek, Martin Saerbeck, Christoph Bartnec...
We present a demonstration of the intelligent agent-based system ORIENT (Overcoming Refugee Integration with Empathic Novel Technology). We summarise the application domain: educa...
Ruth Aylett, Michael Kriegel, Mei Yii Lim, Jo&atil...