Within the realm of network security, we interpret the concept of trust as a relation among entities that participate in various protocols. Trust relations are based on evidence cr...
Abstract—This paper presents the development and performance evaluation of a human-computer interface that enables a limb-disabled person to access a computer via neural signals....
Changmok Choi, Hyonyoung Han, Chunwoo Kim, Jung Ki...
This paper presents an evaluation of evolved term-weighting schemes on short, medium and long TREC queries. A previously evolved global (collection-wide) term-weighting scheme is ...
Low-level image processing algorithms generally provide noisy features that are far from being Gaussian. Medium-level tasks such as object detection must therefore be robust to out...
Sio-Song Ieng, Jean-Philippe Tarel, Pierre Charbon...
In this paper, we study query evaluation on Active XML documents (AXML for short), a new generation of XML documents that has recently gained popularity. AXML documents are XML do...