As the number of available Web services increases there is a growing demand to realise complex business processes by combining and reusing available Web services. In this context,...
Current computer security systems are based on the premise that once a user presents valid credentials to the authentication system (e.g. valid ID and password), they are granted ...
Abstract. Most of the work in Machine Learning assume that examples are generated at random according to some stationary probability distribution. In this work we study the problem...
There are principal differences between the relational model and XML's tree model. This causes problems in all cases where information from these two worlds has to be brought...
This paper introduces an novel framework for speech understanding using extended context-free grammars (ECFGs) by combining statistical methods and rule based knowledge. By only us...