A recent study characterizing failures in computer networks shows that transient single element (node/link) failures are the dominant failures in large communication networks like...
This paper describes the implementation and evaluation of a program that uses active recruiting and peer-led team learning to try to increase the participation and success of wome...
Susan Horwitz, Susan H. Rodger, Maureen Biggers, D...
Unconditionally secure multi-party computations in general, and broadcast in particular, are impossible if any third of the players can be actively corrupted and if no additional i...
Abstract We present a monitoring system which detects repeated packets in network traffic, and has applications including detecting computer worms. It uses Bloom filters with count...
Paul C. van Oorschot, Jean-Marc Robert, Miguel Var...
Predicting the T-cell-mediated immune response is an important task in vaccine design and thus one of the key problems in computational immunomics. Various methods have been devel...
Magdalena Feldhahn, Philipp Thiel, Mathias M. Schu...