We present a method for automatically acquiring of a corpus of disputed claims from the web. We consider a factual claim to be disputed if a page on the web suggests both that the...
Rob Ennals, Dan Byler, John Mark Agosta, Barbara R...
We present a new approach for recognition of complex graphic symbols in technical documents. Graphic symbol recognition is a well known challenge in the field of document image an...
Muhammad Muzzamil Luqman, Thierry Brouard, Jean-Yv...
—During the evolution of a software system, a large amount of information, which is not always directly related to the source code, is produced. Several researchers have provided...
Alberto Bacchelli, Marco D'Ambros, Michele Lanza, ...
Abstract—BitTorrent is a highly popular peer-to-peer filesharing protocol. Much BitTorrent activity takes place within private virtual communities called “Private Trackers” ...
David Hales, Rameez Rahman, Boxun Zhang, Michel Me...
Vulnerability discovery rates need to be taken into account for evaluating security risks. Accurate projection of these rates is required to estimate the effort needed to develop ...