We describe the current state of a resource that enables research in the human sciences with differential access rights for experimenters and participants in experiments. We outli...
Various online studies on the prevalence of spyware attest overwhelming numbers (up to 80%) of infected home computers. However, the term spyware is ambiguous and can refer to anyt...
Andreas Stamminger, Christopher Kruegel, Giovanni ...
Data analysis applications typically aggregate data across many dimensions looking for anomalies or unusual patterns. The SQL aggregate functions and the GROUP BY operator produce ...
Jim Gray, Surajit Chaudhuri, Adam Bosworth, Andrew...
Abstract. We consider the problem of security constrained optimal control for discrete-time, linear dynamical systems in which control and measurement packets are transmitted over ...
In order to gain insight into multivariate data, complex structures must be analysed and understood. Parallel coordinates is an excellent tool for visualizing this type of data bu...
Jimmy Johansson, Patric Ljung, Mikael Jern, Matthe...