Incessant scanning of hosts by attackers looking for vulnerable servers has become a fact of Internet life. In this paper we present an initial study of the scanning activity obse...
There are a number of scenarios where connectivity is intermittent, and a given destination may not be reachable at the moment a message is sent. Networks with these characteristi...
In this paper a new method is described for move ordering, called the relative history heuristic. It is a combination of the history heuristic and the butterfly heuristic. Instead...
Mark H. M. Winands, Erik C. D. van der Werf, H. Ja...
This work explores how comparing web navigation histories between two people and presenting the results to them might allow them to gain insight about each other. We developed a p...
Mark Bilezikjian, John C. Tang, James Bo Begole, N...
Abstract. Clusters of genes that evolved from single progenitors via repeated segmental duplications present significant challenges to the generation of a truly complete human geno...
Adam C. Siepel, Eric D. Green, Giltae Song, Tom&aa...