In this paper, we present a novel fine-grained access control system for applications where the information flow is critical; the confidentiality of the data is essential and there...
We present a generative model for determining the information content of a message without analyzing the message content. Such a tool is useful for automated analysis of the vast ...
Yingjie Zhou, Malik Magdon-Ismail, William A. Wall...
This paper presents a trace-driven simulation study of two classes of retransmission timeout (RTO) estimators in the context of realtime streaming over the Internet. We explore th...
We use an EM algorithm to learn user models in a spoken dialog system. Our method requires automatically transcribed (with ASR) dialog corpora, plus a model of transcription error...
Up-to-date results on the application of Markov models to chromosome analysis are presented. On the one hand, this means using continuous Hidden Markov Models (HMMs) instead of dis...