Access control mechanisms are commonly used to provide control over who may access sensitive information. However, malicious users can exploit the correlation among the data and in...
This paper explores the relationship between discourse structure and coverbal gesture. Using the idea of gestural cohesion, we show that coherent topic segments are characterized ...
Object identification—the task of deciding that two observed objects are in fact one and the same object—is a fundamental requirement for any situated agent that reasons about...
This paper proposes a new variant of the task allocation problem, where the agents are connected in a social network and tasks arrive at the agents distributed over the network. W...
Abstract. In the future, homes will have numerous intelligent communicating devices, and the user would like to configure and coordinate their actions. Appliances and people in in...
Victor Zamudio, Victor Callaghan, Jeannette Shiaw-...