The reliable authentication of user attributes is an important prerequisite for the security of web based applications. Digital certificates are widely used for that purpose. How...
We consider a resource synthesis technique for realtime systems where the energy budget is limited and the performance of the system depends on how resources and energy are used. ...
The intelligence analysis task of anticipating crises and providing decision makers with reasonable (supportable, explainable)possiblefuturesisextremelydifficult.Toperform this ta...
Glenn Taylor, Richard Frederiksen, Russell R. Vane...
This paper describes the architecture of a computer system conceived as an intelligent assistant for public transport management. The goal of the system is to help operators of a c...
It has been widely observed that search queries are composed in a very different style from that of the body or the title of a document. Many techniques explicitly accounting for...