Computer security is severely threatened by software vulnerabilities. Prior work shows that information flow tracking (also referred to as taint analysis) is a promising techniqu...
Feng Qin, Cheng Wang, Zhenmin Li, Ho-Seop Kim, Yua...
Particle systems have long been recognized as an essential building block for detail-rich and lively visual environments. Current implementations can handle up to 10,000 particles...
We have developed an approach for whole-house gross movement and room transition detection through sensing at only one point in the home. We consider this system to be one member o...
Shwetak N. Patel, Matthew S. Reynolds, Gregory D. ...
Recent research has identified significant vulnerabilities in recommender systems. Shilling attacks, in which attackers introduce biased ratings in order to influence future recom...
Sheng Zhang, Amit Chakrabarti, James Ford, Fillia ...
Abstract— In this paper, we propose a new groupwise receiver combiner design method for spatial multiplexing multipleinput multiple-output (MIMO) systems. The conventional group ...