Abstract. Existing localization techniques such as GPS have fundamental limitations which preclude deployment in urban canyons or areas with inconsistent network availability. Augm...
Jeffrey Hemmes, Douglas Thain, Christian Poellabau...
Many real applications can be modeled using bipartite graphs, such as users vs. files in a P2P system, traders vs. stocks in a financial trading system, conferences vs. authors ...
As the scope of personal data grows, it becomes increasingly difficult to find what we need when we need it. Desktop search tools provide a potential answer, but most existing too...
Sam Shah, Craig A. N. Soules, Gregory R. Ganger, B...
Spyware is a class of malicious code that is surreptitiously installed on victims’ machines. Once active, it silently monitors the behavior of users, records their web surfing ...
Manuel Egele, Christopher Kruegel, Engin Kirda, He...
The function of a Network Intrusion Detection System (NIDS) is to identify any misuse and abnormal behavior determined as an attack to a network segment or network host. The propo...