In recent years, much work has been done on attempting to scale multicast data transmission to hundreds or thousands of receivers. There are, however, many situations where an app...
Karl Jeacle, Jon Crowcroft, Marinho P. Barcellos, ...
Several fundamental security mechanisms for restricting access to network resources rely on the ability of a reference monitor to inspect the contents of traffic as it traverses t...
Charles V. Wright, Fabian Monrose, Gerald M. Masso...
In this paper, we develop a framework for measuring the level of protection offered by relation hiding systems. The framework provides a uniform way to define a variety of privacy ...
We describe an experimental Wizard-of-Oz-setup for the integration of emotional strategies into spoken dialogue management. With this setup we seek to evaluate different approache...
Gregor Bertrand, Florian Nothdurft, Steffen Walter...
Assessors frequently disagree on the topical relevance of documents. How much of this disagreement is due to ambiguity in assessment instructions? We have two assessors assess TRE...