The rapid increase of web complexity and size makes web searched results far from satisfaction in many cases due to a huge amount of information returned by search engines. How to...
The history of the application of formal methods to cryptographic protocol analysis spans nearly twenty years, and recently has been showing signs of new maturity and consolidatio...
As the recent denial-of-service attacks on several major Internet sites have shown us, no open computer network is immune from intrusions. The wireless ad-hoc network is particula...
Abstract. The problem of nding documents that are written in a language that the searcher cannot read is perhaps the most challenging application of Cross-Language Information Retr...
Abstract. This paper addresses the issue of simplifying natural language texts in order to ease the task of accessing factual information contained in them. We define the notion of...
Beata Beigman Klebanov, Kevin Knight, Daniel Marcu