Security protocols are small programs designed to ensure properties such as secrecy of messages or authentication of parties in a hostile environment. In this paper we investigate ...
Abstract—We present a method for modeling, and automatically inferring, the current interest of a user in search advertising. Our task is complementary to that of predicting ad r...
Qi Guo, Eugene Agichtein, Charles L. A. Clarke, Az...
VoIP is one of the traditional application scenarios for Mobile Ad Hoc Networks (MANETs) in settings such as emergency response. Ideally, VoIP would be transparent to the network ...
With the evolving functionality in television-based (TVbased) information and entertainment appliances, there is an increased need to enable users input text through remote contro...
The current state of the art in visualization research places a strong emphasis on different techniques to derive insight from disparate types of data. However, little work has in...