Given the significant increase of on-line services that require personal information from users, the risk that such information is misused has become an important concern. In such ...
Many authorization system models include some notion of obligation. Little attention has been given to user obligations that depend on and affect authorizations. However, to be u...
Murillo Pontual, Omar Chowdhury, William H. Winsbo...
Background: There has been considerable effort focused on developing efficient programs for tagging single-nucleotide polymorphisms (SNPs). Many of these programs do not account f...
Christopher K. Edlund, Won H. Lee, Dalin Li, David...
This paper presents a technique for producing short summaries from multiple documents. This technique promotes the belief that informative short summaries may be generated when us...
Sanda M. Harabagiu, V. Finley Lacatusu, Steven J. ...
Abstract. Autonomous exploration is a frequently addressed problem in the robotics community. This paper presents an approach to mobile robot exploration that takes into account th...
Dominik Joho, Cyrill Stachniss, Patrick Pfaff, Wol...