Setting up security associations between end-user devices is a challenging task when it needs to be done by ordinary users. The increasing popularity of powerful personal electroni...
Given a program and an attack pattern (specified as a regular expression), we automatically generate string-based vulnerability signatures, i.e., a characterization that includes...
The evaluation of a large implemented natural language processing system involves more than its application to a common performance task. Such tasks have been used in the message u...
In this paper we want to point out some issues arising when a natural language processing task involves several languages (like multilingual, multidocument summarization and the m...
In this paper, we propose a novel semi-supervised algorithm, which works under a two-view setting. Our algorithm, named Kernel Canonical Component Analysis Graph (KC-GRAPH), can e...