It is well known that it is insecure to use the access(2) system call in a setuid program to test for the ability of the program's executor to access a file before opening sa...
This paper presents a new criterion for viewpoint selection in the context of active Bayesian object recognition and pose estimation. Recognition is performed by probabilistically...
Heuristic algorithms have enjoyed increasing interests and success in the context of Utility Accrual (UA) scheduling. However, few analytical results, such as bounds on task-level...
Peng Li, Hyeonjoong Cho, Binoy Ravindran, E. Dougl...
In the context of web search engines, the escalation between ranking techniques and spamdexing techniques has led to the appearance of faked contents in web pages. If random sequen...
An ontology is a speci...cation of a conceptualization, a shared understanding of some domain of interest. The paper develops an algorithm that hierarchically groups words together...