An intrusion detection system (IDS) usually has to analyse Giga-bytes of audit information. In the case of anomaly IDS, the information is used to build a user profile characteris...
The paper develops a self-tuning resource aware partial evaluation technique for Prolog programs, which derives its own control strategies tuned for the underlying computer archit...
In this article, we present the Association Engine, a multimedia installation that explores the space of language and exposes connections between words. It externalizes meaningful...
Sara Owsley, David A. Shamma, Kristian J. Hammond,...
The goal of automatic image annotation is to automatically generate annotations for images to describe their content. In the past, statistical machine translation models have been...
We study the random composition of a small family of O(n3 ) simple permutations on {0, 1}n . Specifically we ask what is the number of compositions needed to achieve a permutatio...
Shlomo Hoory, Avner Magen, Steven Myers, Charles R...