Many software security solutions—including malware analyzers, information flow tracking systems, auditing utilities, and host-based intrusion detectors—rely on knowledge of s...
Abhinav Srivastava, Andrea Lanzi, Jonathon T. Giff...
We consider the problem of finding duplicates in data streams. Duplicate detection in data streams is utilized in various applications including fraud detection. We develop a solu...
Stix is a platform managing emerging large-scale broadband wireless access (BWA) networks. It has been developed to make it easy to manage such networks for community deployments ...
Giacomo Bernardi, Matt Calder, Damon Fenacci, Alex...
This poster will describe the Learner Interaction Monitoring System (LiMS), designed to capture data demonstrating learner online engagement with course materials. The poster prese...
— We have developed an analysis-based design tool, ANDES, for modeling a wireless sensor network system and analyzing its performance before deployment. ANDES enables designers t...