In [1], we proposed a model for policy-based intrusion detection, based on information flow control. In the present paper, we show its applicability and effectiveness on a stand...
Abstract. Dealing with methods of Human-Robot-Interaction and using a real mobile robot, stable methods for people detection and tracking are fundamental features of such a system ...
The plagiarism detection system described in this paper is aiming at bringing external plagiarism detection to the desktop. The main ideas are to incorporate standard IR technologi...
This paper investigates the detection of named entity (NE) patterns by comparing the results of NE patterns resulting from a user analysis and a system analysis. Findings revealed ...
Abstract. We quantify the local information dynamics at each spatiotemporal point in a complex system in terms of each element of computation: information storage, transfer and mod...
Joseph T. Lizier, Mikhail Prokopenko, Albert Y. Zo...