In-lined Reference Monitoring frameworks are an emerging technology for enforcing security policies over untrusted, mobile, binary code. However, formulating correct policy specifi...
A computational model for the acquisition of knowledge from encyclopedic texts is described. The model has been implemented in a program, called SNOWY, that reads unedited texts f...
In recent years we have seen great progress made in the area of automatic source-level static analysis tools. However, most of today's program verification tools are limited ...
Byron Cook, Alexey Gotsman, Andreas Podelski, Andr...
MKPLS (Multiway Kernel Partial Least Squares) methods are used to model the batch processes from process operational data. To improve the optimization performance, a batch-to-batc...
Domestic ubicomp applications often assume individual users will program and configure their technology in isolation, decoupled from complex domestic environments in which they ar...
Jennifer A. Rode, Eleanor F. Toye, Alan F. Blackwe...