A network covert channel is a mechanism that can be used to leak information across a network in violation of a security policy and in a manner that can be difficult to detect. In...
Image artifacts that result from sensor dust are a common but annoying problem for many photographers. To reduce the appearance of dust in an image, we first formulate a model of ...
The combined efforts of human volunteers have recently extracted numerous facts from Wikipedia, storing them as machine-harvestable object-attribute-value triples in Wikipedia inf...
MT systems that use only superficial representations, including the current generation of statistical MT systems, have been successful and useful. However, they will experience a p...
Florence Reeder, Bonnie J. Dorr, David Farwell, Ni...
Integrating complex enterprise systems is challenging and reliability and performance of the integrated systems can be problematic when using typical solutions of distributed tran...
John C. Grundy, Jun Bai, John Blackham, John G. Ho...