—Many factors are believed to increase the vulnerability of software system; for example, the more widely deployed or popular is a software system the more likely it is to be att...
Thomas Zimmermann, Nachiappan Nagappan, Laurie A. ...
This paper focuses on the development of a cost-aware Bayesian sequential decision-making strategy for the search and classification of multiple unknown objects over a given domain...
Yue Wang, Islam I. Hussein, Donald R. Brown, Richa...
The next wave in search technology will be driven by the identification, extraction, and exploitation of real-world entities represented in unstructured textual sources. Search sy...
Media studies concerns the study of production, content, and/or reception of various types of media. Today’s continuous production and storage of media is changing the way media...
Marc Bron, Jasmijn van Gorp, Frank Nack, Maarten d...
We show how a greedy approach to visual search — i.e., directly moving to the most likely location of the target — can be suboptimal, if the target object is hard to detect. I...