In recent years, with camera pixels shrinking in size, images are more likely to include defocused regions. In order to recover scene details from defocused regions, deblurring tec...
We investigate the subtle cues to user identity that may be exploited in attacks on the privacy of users in web search query logs. We study the application of simple classifiers ...
The demographics of computer-mediated communication (CMC) users have changed considerably over the last twenty years. Whereas in the 1980's it was largely academics, and comp...
This article presents a method for valuing software, based on the income that use of that software is expected to generate in the future. It applies well known principles of intel...
Abstract--The Distributed Stochastic Algorithm (DSA), Distributed Breakout Algorithm (DBA), and variations such as Distributed Simulated Annealing (DSAN), MGM-1, and DisPeL, are di...