Most network anomaly detection research is based on packet header fields, while the payload is usually discarded. Preventing unknown attacks and Internet worms has led to a need f...
This paper identifies and explores the problem of seed selection in a web-scale crawler. We argue that seed selection is not a trivial but very important problem. Selecting proper...
This tutorial focuses on the task of automated information linking in text and multimedia sources. In any task where information is fused from different sources, this linking is ...
−Buffered multistage interconnection networks offer one of the most scalable and cost-effective approaches to building high capacity routers. Unfortunately, the performance of su...
Distance Education Course (DEC) has been becoming more and more popular in many universities with the fast development of the Internet technology. The communication between the te...