Abstract. The perspective directions in evaluating network security are simulating possible malefactor's actions, building the representation of these actions as attack graphs...
This paper presents a method for unsupervised discovery of semantic patterns. Semantic patterns are useful for a variety of text understanding tasks, in particular for locating ev...
We describe an approach for building and testing software for ubiquitous computing. The approach provides application-level emulators of ubiquitous devices. Since each emulator is...
A system to interactively create and modify/edit American Sign Language signs is described. The system is grounded on the use of three-dimensional computer graphics to construct t...
Jorge Toro, Jacob D. Furst, Karen Alkoby, Roymieco...
The number of networked multimedia platforms that are introduced into the market has increased dramatically in recent years. Current approaches to multimedia distribution do not s...
Stijn Decneut, Filip Hendrickx, Steven Van Assche,...