Access control mechanisms are commonly used to provide control over who may access sensitive information. However, malicious users can exploit the correlation among the data and in...
Many problems require repeated inference on probabilistic graphical models, with different values for evidence variables or other changes. Examples of such problems include utilit...
Abstract--The inadequate quality of context forces the context consumers in pervasive environments to reason about the quality and relevance of context to be confident of its worth...
Atif Manzoor, Hong Linh Truong, Christoph Dorn, Sc...