Applications are subject to threat from a number of attack vectors, and limiting their attack surface is vital. By using privilege separation to constrain application access to pro...
Dhananjay Bapat, Kevin R. B. Butler, Patrick Drew ...
It is argued that we are experiencing a paradigm shift from a user perspective to a client perspective in library and information science. The paradigm shift is brought about by re...
This poster describes methods to enable intelligent access to multimodal information streams. We illustrate these methods in two integrated systems: the Broadcast News Editor (BNE...
This paper presents an associative agent that allows seamless navigation from one's own personal space to third-party associative sources, as well as the personal spaces of o...
Most databases contain “name constants” like course numbers, personal names, and place names that correspond to entities in the real world. Previous work in integration of het...