The identification of mechanisms by which constraints on phenotypic variability are tuned in nature, and the implementation of these mechanisms in Evolutionary Algorithms (EAs) ca...
Many authorization system models include some notion of obligation. Little attention has been given to user obligations that depend on and affect authorizations. However, to be u...
Murillo Pontual, Omar Chowdhury, William H. Winsbo...
— Performance measurements of IEEE 802.11 access points provide important information for networking research and network management. In this paper, we present an active measurem...
Recent research has had some success using the length of time a user displays a document in their web browser as implicit feedback for document preference. However, most studies h...
We present an end-to-end system that extracts a user’s social network and its members’ contact information given the user’s email inbox. The system identifies unique people...