We present a method for training a similarity metric from data. The method can be used for recognition or verification applications where the number of categories is very large an...
Abstract—The traditional virtual machine usage model advocates placing security mechanisms in a trusted VM layer and letting the untrusted guest OS run unaware of the presence of...
Daniela Alvim Seabra de Oliveira, Shyhtsun Felix W...
In the Design By Contract (DBC) approach, programmers specify methods with pre and postconditions (also called contracts). Earlier work added protocols to the DBC approach to desc...
A substantial subset of the web data follows some kind of underlying structure. Nevertheless, HTML does not contain any schema or semantic information about the data it represents...
E-science experiments typically involve many distributed services maintained by different organisations. After an experiment has been executed, it is useful for a scientist to ver...
Sylvia C. Wong, Simon Miles, Weijian Fang, Paul T....