In the research area of automatic web information extraction, there is a need for permanent and annotated web page collections enabling objective performance evaluation of differen...
Several novel and particularly successful object and object category detection and recognition methods based on image features, local descriptions of object appearance, have recent...
Jarmo Ilonen, Joni-Kristian Kamarainen, Pekka Paal...
Abstract. Security protocols aim at securing communications over public networks. Their design is notoriously difficult and error-prone. Formal methods have shown their usefulness ...
Two parties, say Alice and Bob, possess two sets of elements that belong to a universe of possible values and wish to test whether these sets are disjoint or not. In this paper we ...
Large-scale ontologies are becoming an essential component of many applications including standard search (such as Yahoo and Lycos), ecommerce (such as Amazon and eBay), configura...
Deborah L. McGuinness, Richard Fikes, James Rice, ...