The constant increase of moving object data imposes the need for modeling, processing, and mining trajectories, in order to find and understand the patterns behind these data. Ex...
A framework for analyzing the computational capabilities and the limitations of the evolutionary process of random change guided by selection was recently introduced by Valiant [V...
Real-world IP applications such as Peer-to-Peer filesharing are now able to benefit from network and location awareness. It is therefore crucial to understand the relation betwe...
Alexandru Iosup, Pawel Garbacki, Johan A. Pouwelse...
Despite its intuitive appeal, the hypothesis that retrieval at the level of “concepts” should outperform purely term-based approaches remains unverified empirically. In addit...
Achieving information assurance and security is a complex and challenging task, which is crucial from national and personal security point of views. Research in detecting deceptiv...