Location-hidden services, as offered by anonymity systems such as Tor, allow servers to be operated under a pseudonym. As Tor is an overlay network, servers hosting hidden service...
Abstract. We explore a new general-purpose heuristic for nding highquality solutions to hard optimization problems. The method, called extremal optimization, is inspired by self-or...
Stefan Boettcher, Allon G. Percus, Michelangelo Gr...
Building repositories for e-learning is an iterative process and course content and course structure are always changing. We realized the necessity to separate content from structu...
Hadhami Dhraief, Wolfgang Nejdl, Boris Wolf, Marti...
In this paper, we describe the development of an Embodied Conversational Agent (ECA) implementing the concept of a companion, i.e. an agent supporting the persistent representatio...
Marc Cavazza, Cameron Smith, Daniel Charlton, Li Z...
For evaluating the contents of trucks, containers, cargo, and passenger vehicles by a non-intrusive gamma-ray or X-ray imaging system to determine the possible presence of contrab...