Software keyloggers are a fast growing class of malware often used to harvest confidential information. One of the main reasons for this rapid growth is the possibility for unpriv...
Stefano Ortolani, Cristiano Giuffrida, Bruno Crisp...
In order to support interactive high-fidelity prototyping of postWIMP user interactions, we propose a multi-fidelity design method based on a unifying component-based model and su...
We introduce a novel approach for robust belief tracking of user intention within a spoken dialog system. The space of user intentions is modeled by a probabilistic extension of t...
Neville Mehta, Rakesh Gupta, Antoine Raux, Deepak ...
: The desideratum of semantic interoperability has been intensively discussed in medical informatics circles in recent years. Originally, experts assumed that this issue could be s...
Holger Stenzhorn, Stefan Schulz, Martin Boeker, Ba...
Most existing research about online trust assumes static trust relations between users. As we are informed by social sciences, trust evolves as humans interact. Little work exists...
Jiliang Tang, Huan Liu, Huiji Gao, Atish Das Sarma...