Abstract—Attack Graphs are an important support for assessment and subsequent improvement of network security. They reveal possible paths an attacker can take to break through se...
Virginia N. L. Franqueira, Pascal van Eck, Roel Wi...
We study the problem of answering ambiguous web queries in a setting where there exists a taxonomy of information, and that both queries and documents may belong to more than one ...
Rakesh Agrawal, Sreenivas Gollapudi, Alan Halverso...
Searching posts effectively has become an important issue in large-scale online communities. Especially, if search users have different inclinations when they search posts, they h...
In this paper, we address the problem of face tracking across illumination changes and occlusions. The method is based on leveraging the strengths of both Adaboost to deal with cl...
Performance of n-gram language models depends to a large extent on the amount of training text material available for building the models and the degree to which this text matches...