Geographic information systems use databases to map keywords to places. These databases are currently most often created by using a top-down approach based on the geographic defini...
Overlay networks have emerged as a powerful paradigm to realise a large range of distributed services. However, as the number of overlays grows and the systems that use them become...
Drive-by download attacks are among the most common methods for spreading malware today. These attacks typically exploit memory corruption vulnerabilities in web browsers and brows...
Manuel Egele, Peter Wurzinger, Christopher Kruegel...
The paper summarises the ambient vibration-based assessment of an historic suspension footbridge, dating back to 1928. The footbridge is characterised by the timber floor system s...
Background: Research in evolution requires software for visualizing and editing phylogenetic trees, for increasingly very large datasets, such as arise in expression analysis or m...
Daniel H. Huson, Daniel C. Richter, Christian Raus...