We propose and investigate a game-theoretic approach to the malware filtering and detector placement problem which arises in network security. Our main objective is to develop opt...
Stephan Schmidt, Tansu Alpcan, Sahin Albayrak, Tam...
Abstract. The database server is a crucial bottleneck in traditional inference control architecture, as it enforces highly computation-intensive auditing for all users who query th...
This paper introduces a novel corpus of natural language dialogues obtained from humans performing a cooperative, remote, search task (CReST) as it occurs naturally in a variety o...
Kathleen M. Eberhard, Hannele Nicholson, Sandra K&...
This paper describes how heterogeneous data sources captured in the SignCom project may be used for the analysis and synthesis of French Sign Language (LSF) utterances. The captur...
This paper presents an approach that provides the necessary assistance to those who are in charge of engineering communities of Web services. Current practices indicate that Web se...
Sattanathan Subramanian, Philippe Thiran, Zakaria ...