We introduce the Free Factory, a platform for deploying data-intensive web services using small clusters of commodity hardware and free software. Independently administered virtua...
Alexander Wait Zaranek, Tom Clegg, Ward Vandewege,...
One of the most critical steps of any security review involves identifying the trust boundaries that an application is exposed to. While methodologies such as threat modeling can ...
This research endeavor focused on the warehouse receiving process at a large food distribution center, which comprises of trucks with goods reaching the destination warehouse, unl...
An approach is presented for high throughput matching of regular expressions (regexes) by first converting them into corresponding Non-deterministic Finite Automata (NFAs) which a...
Norio Yamagaki, Reetinder P. S. Sidhu, Satoshi Kam...
Discourse phenomena play a major role in text processing tasks. However, so far relatively little study has been devoted to the relevance of discourse phenomena for inference. The...
Azad Abad, Luisa Bentivogli, Ido Dagan, Danilo Gia...