Mass-mailing worms have made a significant impact on the Internet. These worms consume valuable network resources and can also be used as a vehicle for DDoS attacks. In this paper...
Cynthia Wong, Stan Bielski, Jonathan M. McCune, Ch...
The study presented here relies on the integrated use of different kinds of knowledge in order to improve first-guess accuracy in non-word context-sensitive correction for general...
This paper describes a grapheme-to-phoneme conversion method using phoneme connectivity and CCV conversion rules. The method consists of mainly four modules including morpheme nor...
Byeongchang Kim, Wonil Lee, Gary Geunbae Lee, Jong...
We describe a framework for planning in dynamic environments. A central question is how to focus the sensing performed by such a system, so that it responds appropriately to relev...
Manuela M. Veloso, Martha E. Pollack, Michael T. C...
Internet servers need to be highly-available, inexpensive, and scalable. These goals are often con icting and most designs meet, with limited success, only few of them. In this pa...