Many applications of IP geolocation can benefit from geolocation that is robust to adversarial clients. These include applications that limit access to online content to a specifi...
Phillipa Gill, Yashar Ganjali, Bernard Wong, David...
We examine the problem of acoustic emanations of printers. We present a novel attack that recovers what a dotmatrix printer processing English text is printing based on a record o...
The steady-state throughput of general network coding node is investigated, when data is transmitted in packets based on the stopand-wait automatic repeat request (SW-ARQ) error-co...
Recent work on temporal relation identification has focused on three types of relations between events: temporal relations between an event and a time expression, between a pair o...
Katsumasa Yoshikawa, Sebastian Riedel, Masayuki As...
In this paper, we analyze the impact of different automatic annotation methods on the performance of supervised approaches to the complex question answering problem (defined in th...