Attacks against privileged applications can be detected by analyzing the stream of system calls issued during process execution. In the last few years, several approaches have been...
Darren Mutz, William K. Robertson, Giovanni Vigna,...
Abstract. Critiquing techniques provide an easy way for users to feedback their preferences over one or several attributes of the products in a conversational recommender system. W...
Locales (as first embodied in the SPLINE system) are a very good approach to constructing and organising large virtual environments, especially for distributed and multiuser syste...
Reactive rules are used for programming rule-based, reactive systems, which have the ability to detect events and respond to them automatically in a timely manner. Such systems are...
Many researchers are trying to use information extraction (IE) to create large-scale knowledge bases from natural language text on the Web. However, the primary approach (supervis...