In recent years, malicious software (malware) has become one of the most insidious threats in computer security. However, this is arguably not the result of increased sophisticati...
— In this paper we study multi-hop ad hoc routing in a scalable Underwater Sensor Network (UWSN), which is a novel network paradigm for ad hoc investigation of the world below th...
Uichin Lee, Jiejun Kong, Joon-Sang Park, Eugenio M...
A considerable effort has been recently devoted to the development of Database Management Systems (DBMS) which guarantee high assurance security and privacy. An important componen...
Internet servers are developing into complex but central components in the information infrastructure and are accessed by an ever-increasing and diversified user population. As s...
Our goal is to develop the capability for characterizing the three-dimensional geological structure and mechanical properties of individual sites and complete basins in earthquake-...
Volkan Akcelik, Jacobo Bielak, George Biros, Ioann...