In a bid to limit the harm caused by ubiquitous remotely exploitable software vulnerabilities, the computer systems security community has proposed primitives to allow execution o...
In many image and video collections, we have access
only to partially labeled data. For example, personal photo
collections often contain several faces per image and a caption
t...
Benjamin Sapp, Benjamin Taskar, Chris Jordan, Timo...
Software repositories provide abundance of valuable information about open source projects. With the increase in the size of the data maintained by the repositories, automated ext...
This paper addresses the problem of identifying redundant data in large-scale service-oriented information systems. Specifically, the paper puts forward an automated method to pi...
Geospatial data sharing is an increasingly important subject as large amount of data is produced by variety of sources, stored in incompatible formats, and accessible through diffe...