When computer security violations are detected, computer forensic analysts attempting to determine the relevant causes and effects are forced to perform the tedious tasks of find...
This paper describes the process used to extend the Boost Graph Library (BGL) for parallel operation with distributed memory. The BGL consists of a rich set of generic graph algor...
OASIS Archive project aimed at developing a system for the universal presentation of Media Art works independent of location. The goal was to establish a user-friendly search syste...
Juergen Enge, Andrzej Glowacz, Michal Grega, Mikol...
We model the performance of a speaker recognition system used for surveillance to prioritize a large number of candidate speakers in search of a single target speaker. It is assum...
This paper analyzes the topic identification stage of single-document automatic text summarization across four different domains, consisting of newswire, literary, scientific and ...
Hakan Ceylan, Rada Mihalcea, Umut O'zertem, Elena ...