Dynamic criminal network analysis is important for national security but also very challenging. However, little research has been done in this area. In this paper we propose to use...
Jennifer Jie Xu, Byron Marshall, Siddharth Kaza, H...
In this work we compare different techniques to automatically find candidate web pages to substitute broken links. We extract information from the anchor text, the content of the p...
Credal networks are models that extend Bayesian nets to deal with imprecision in probability, and can actually be regarded as sets of Bayesian nets. Credal nets appear to be power...
Remotely-launched software exploits are a common way for attackers to intrude into vulnerable computer systems. As detection techniques improve, remote exploitation techniques are...
Qinghua Zhang, Douglas S. Reeves, Peng Ning, S. Pu...
This paper presents a system which analyzes an in'put text syntactically and morphologically and converts the text from the graphemic to the phonetic :representation (or vice...