Attacks against privileged applications can be detected by analyzing the stream of system calls issued during process execution. In the last few years, several approaches have been...
Darren Mutz, William K. Robertson, Giovanni Vigna,...
Effective communication is critical to the success of a software development project. It factors into the productivity of individuals and organizations, and has particular impact ...
Michael E. Atwood, Bart Burns, Dieter Gairing, And...
In this paper, we present a folksonomy-based approach for implicit user intent extraction during a Web search process. We present a number of result re-ranking techniques based on...
Research on resource-bounded agents has established that rational agents need to be able to revise their commitments in the light of new opportunities. In the context of collabora...
Intention recognition has significant applications in ambient intelligence, for example in assisted living and care of the elderly, in games and in intrusion and other crime detec...