We consider the effect attackers who disrupt anonymous communications have on the security of traditional high- and low-latency anonymous communication systems, as well as on the...
Nikita Borisov, George Danezis, Prateek Mittal, Pa...
IEEE 802.11 based wireless LANs (WLAN) are ubiquitous nowadays. Running real time voice and video applications over LANs is becoming common place. These applications require QoS i...
Our goal in this study was to explore the potentials of extracting features from eye-tracking data that have the potential to improve performance in implicit relevance feedback. We...
Kirsten Kirkegaard Moe, Jeanette M. Jensen, Birger...
The paper focuses on a difficult problem when formalizing knowledge: What about the possible concepts that didn’t make it into the formalization? We call such concepts the uncons...
Text summarization with the consideration of coherence can be achieved by using discourse processing with the Rhetorical Structure Theory (RST). Additional problems on relational a...