Personalization systems exploit preferences for providing users with only relevant data from the huge volume of information that is currently available. We consider preferences th...
Abstract. Current measures to enhance the security of untrusted mobile applications require a user to trust the software vendor. They do not guarantee complete protection against t...
In this paper we present a new technique which exploits timing-correlation between tasks for scheduling analysis in multiprocessor and distributed systems with tree-shaped task-de...
Predicting human occupations in photos has great application potentials in intelligent services and systems. However, using traditional classification methods cannot reliably dis...
Pointer analyses derived from a Context-Free-Language (CFL) reachability formulation achieve very high precision, but they do not scale well to compute the points-to solution for a...