Anomaly detection systems largely depend on user profile data to be able to detect deviation from normal activity. Most of this profile data is based on commands executed by use...
This paper describes our novel retrieval model that is based on contexts of query terms in documents (i.e., document contexts). Our model is novel because it explicitly takes into...
Ho Chung Wu, Robert W. P. Luk, Kam-Fai Wong, K. L....
When people engage in conversation, they tailor their utterances to their conversational partners, whether these partners are other humans or computational systems. This tailoring...
Marilyn A. Walker, Steve Whittaker, Amanda Stent, ...
Emerging single-chip heterogeneous multiprocessors feature hundreds of design elements contending for shared resources, making it difficult to isolate performance impacts of indiv...
Background: When investigating covariate interactions and group associations with standard regression analyses, the relationship between the response variable and exposure may be ...
John J. Heine, Walker H. Land Jr., Kathleen M. Ega...