Skew is prevalent in data streams, and should be taken into account by algorithms that analyze the data. The problem of finding "biased quantiles"-- that is, approximate...
Graham Cormode, Flip Korn, S. Muthukrishnan, Dives...
LaMacchia, Lauter and Mityagin recently presented a strong security definition for authenticated key agreement strengthening the well-known Canetti-Krawczyk definition. They also ...
We propose an efficient method, built on the popular Bag
of Features approach, that obtains robust multiclass pixellevel
object segmentation of an image in less than 500ms,
with...
David Aldavert, Arnau Ramisa, Ricardo Toledo, Ramo...
The increased online presence of jihadists has raised the possibility of individuals being radicalised via the Internet. To date, the study of violent radicalisation has focused o...
Adam Bermingham, Maura Conway, Lisa McInerney, Nei...
This paper reports a usability evaluation of three operational digital libraries (DLs): the ACM DL, the IEEE Computer Society DL, and the IEEE Xplore DL. An experiment was conduct...