Advancing our knowledge about cues to deception is crucial to successful deception detection. A lengthy list of cues to deception has been identified via a myriad of deception stu...
This contribution describes the design and performance testing of an Advanced Encryption Standard (AES) compliant encryption chip that delivers 2.29 GB/s of encryption throughput ...
The strength of Micro Systems Technology (MST) is the ability to fabricate a large number of small devices economically. However such devices tend to have errors caused by the vari...
Much research in software engineering have been focused on improving software quality and automating the maintenance process to reduce software costs and mitigating complications ...
Abstract. This paper shows how Wikipedia and the semantic knowledge it contains can be exploited for document clustering. We first create a concept-based document representation b...
Anna Huang, David N. Milne, Eibe Frank, Ian H. Wit...