Web applications security is one of the most daunting tasks today, because of security shift from lower levels of ISO OSI model to application level, and because of current situati...
Mobile agents operating in networked environments face threats from other agents as well as from the hosts (i.e., network sites) they visit. A black hole is a harmful host that de...
Stefan Dobrev, Paola Flocchini, Rastislav Kralovic...
We developed and tested a website and public display to connect and sustain carpoolers in the workplace. We arrived at this design through study of traffic congestion and its caus...
: Computer Assisted Surgery seeks data from various sources related to surgical knowledge, which is mostly represented in the form of discrete databases. However, databases serve a...
Transfer learning aims to solve new learning problems by extracting and making use of the common knowledge found in related domains. A key element of transfer learning is to ident...
Qiang Yang, Vincent Wenchen Zheng, Bin Li, Hankz H...