It is widely acknowledged that information such as web content should be adapted for mobile platforms to account for restrictions in mobile environments. As emerging mobile platfor...
Martin Gaedke, Michael Beigl, Hans-Werner Gellerse...
Computer malwares (e.g., botnets, rootkits, spware) are one of the most serious threats to all computers and networks. Most malwares conduct their malicious actions via hijacking t...
Reseachers have verified that clothing provides information about the identity of the individual. To extract features from the clothing, the clothing region first must be localize...
Graphs are being increasingly used to model a wide range of scientific data. Such widespread usage of graphs has generated considerable interest in mining patterns from graph datab...
Tor is an anonymous communications network with thousands of router nodes worldwide. An intuition reflected in much of the literature on anonymous communications is that, as an a...