Abstract— Ensuring the security of computers is a nontrivial task, with many techniques used by malicious users to compromise these systems. In recent years a new threat has emer...
The analogy between Immune Systems and Intrusion Detection Systems encourage the use of Artificial Immune Systems for anomaly detection in computer networks. This paper describes ...
—In this paper, transmission over time-selective, flat fading relay channels is studied. It is assumed that channel fading coefficients are not known a priori. Transmission tak...
In various settings, such as when customers use the same passwords at several independent web sites, security decisions by one organization may have a significant impact on the s...
Reiko Ann Miura-Ko, Benjamin Yolken, John Mitchell...
The goal of the MobileASL project is to increase accessibility by making the mobile telecommunications network available to the signing Deaf community. Video cell phones enable De...
Neva Cherniavsky, Richard E. Ladner, Eve A. Riskin