In this paper we address issues related to building a large-scale Chinese corpus. We try to answer four questions: (i) how to speed up annotation, (ii) how to maintain high annota...
This paper presents models for graphite pencil, drawing paper, blenders, and kneaded eraser that produce realistic looking pencil marks, textures, and tones. Our models are based ...
This paper presents observations of traffic to and from a particular World-Wide Web server over the course a year and a half. This paper presents a longitudinal look at various ne...
The paper identifies elements in network monitoring systems that cause errors in the load measurements found in recent reports on network statistics from an academic backbone netw...
The term "private" in virtual private network is sometimes taken for granted, and people can be too distracted by the "virtual" and "network" to real...
act interpretation. R. Barbuti, C. Bernardeschi and N. De Francesco With mobile technology more and more prominent, the problem of security leakages becomes more and more important...
Let V () be a shift invariant subspace of L2 (R) generated by a Riesz or frame generator (t) in L2 (R). We assume that (t) is suitably chosen so that the regular sampling expansio...
This paper provides the asymptotic analysis of the loss probability in the GI/M/1/n queueing system as n increases to infinity. The approach of this paper is alternative to that of...
: In this paper I recapitulate the ideas of Berman and Hafner (1993) regarding the role of teleology in legal argument. I show how these ideas can be used to address some issues ar...