Abstract— Today’s mobile, wireless, and ad-hoc communications often exhibit extreme characteristics challenging assumptions underlying the traditional way of end-toend communic...
Processing server logs for the email arriving at an ISP can be used to detect remote sites where machines are infected by email viruses or have been hijacked and used for sending ...
In this paper, we devise a method for the estimation of the true support of itemsets on data streams, with the objective to maximize one chosen criterion among {precision, recall}...
Pierre-Alain Laur, Richard Nock, Jean-Emile Sympho...
Abstract. This paper describes a full data-driven system for question answering. The system uses pattern matching and statistical techniques to identify the relevant passages as we...
The Business Process Execution Language for Web Services (BPEL) has emerged as a standard for specifying and executing processes. It is supported by vendors such as IBM and Microso...
Wil M. P. van der Aalst, Marlon Dumas, Arthur H. M...