Finding relevant information in a hyperspace has been a much studied problem for many years. With the emergence of so called Web 2.0 technologies we have seen the use of social sy...
Rosta Farzan, Maurice Coyle, Jill Freyne, Peter Br...
As human-computer interaction becomes more closely modeled on human-human interaction, new techniques and strategies for human-computer interaction are required. In response to th...
Jeffrey Heer, Nathaniel Good, Ana Ramirez, Marc Da...
Online forums contain huge amounts of valuable user-generated content. In current forum systems, users have to passively wait for other users to visit the forum systems and read/an...
Yanhong Zhou, Gao Cong, Bin Cui, Christian S. Jens...
: Most intrusion detection systems deployed today apply misuse detection as analysis method. Misuse detection searches for attack traces in the recorded audit data using predefined...
Abstract— Research on numerical solution methods for partially observable Markov decision processes (POMDPs) has primarily focused on discrete-state models, and these algorithms ...