The use of large quantities of common sense has long been thought to be critical to the automated understanding of the world. To this end, various groups have collected repositori...
William Pentney, Ana-Maria Popescu, Shiaokai Wang,...
A rogue insider, in a wireless network, is an authenticated member that exploits possession of a valid identity in order to launch an attack. A typical example is the transmission...
In this paper, we propose a joint probabilistic topic model for simultaneously modeling the contents of multi-typed objects of a heterogeneous information network. The intuition b...
To cope with society’s demand for transparency and corruption prevention, the Brazilian Office of the Comptroller General (CGU) has carried out a number of actions, including: aw...
Rommel N. Carvalho, Kathryn B. Laskey, Paulo Cesar...
We present a probabilistic program-transformation algorithm to render a given program tamper-resistant. In addition, we suggest a model to estimate the required effort for an atta...
Nenad Dedic, Mariusz H. Jakubowski, Ramarathnam Ve...