The concept of context-dependent access control has emerged during the last years: Information about the state of a process model of a working environment is combined with general ...
In the era of deep sub-wavelength lithography for nanometer VLSI designs, manufacturability and yield issues are critical and need to be addressed during the key physical design i...
Security researchers are applying software reliability models to vulnerability data, in an attempt to model the vulnerability discovery process. I show that most current work on t...
In his book "Consciousness Explained"[2], Daniel Dennett explores some of what he perceives are the weaknesses in current models of cognition, and tries to provide an alt...
Most information extraction (IE) approaches have considered only static text corpora, over which we apply IE only once. Many real-world text corpora however are dynamic. They evol...
Fei Chen 0002, Byron J. Gao, AnHai Doan, Jun Yang ...