Keylogging and phishing attacks can extract user identity and sensitive account information for unauthorized access to users’ financial accounts. Most existing or proposed solut...
This paper proposes a study of the IPTV world, focusing on network and system architectures, video codecs, network protocols, services and quality assurance. Based on this study, a...
— Video streaming on mobile devices such as PDA’s, laptop PCs, pocket PCs and cell phones is becoming increasingly popular. These mobile devices are typically constrained by th...
Piyush Parate, Lakshmish Ramaswamy, Suchendra M. B...
In this type-II demo, we introduce SIDE1 (the Summarization Integrated Development Environment), an infrastructure that facilitates construction of summaries tailored to the needs...
We describe a plugin extension to the Thunderbird Mail Client to support standardized evaluation of multiple spam filters on private mail streams. Researchers need not view or han...