In this paper, we describe an information agent, that resides on a mobile computer or personal digital assistant (PDA), that can autonomously acquire sensor readings from pervasiv...
Alex Rogers, Mike Osborne, Sarvapali D. Ramchurn, ...
It is well known that the use of a good Machine Transliteration system improves the retrieval performance of Cross-Language Information Retrieval (CLIR) systems when the query and ...
Raghavendra Udupa, K. Saravanan, Anton Bakalov, Ab...
— In this paper, we propose an endpoint-based joint network-host anomaly detection technique to detect selfpropagating malicious codes. Our proposed technique is based on the obs...
Textual patterns have been used effectively to extract information from large text collections. However they rely heavily on textual redundancy in the sense that facts have to be m...
Recent research results show that a wireless ad hoc network can exploit controlled node mobility to reduce communication energy consumption. Node movement, however, may consume a ...