We examine the effect of modeling a researcher’s past works in recommending scholarly papers to the researcher. Our hypothesis is that an author’s published works constitute a...
Recent works in image editing are opening up new possibilities to manipulate and enhance input images. Within this context, we leverage well-known characteristics of human percept...
We describe an approach to building security services for context-aware environments. Specifically, we focus on the design of security services that incorporate the use of securi...
Michael J. Covington, Prahlad Fogla, Zhiyuan Zhan,...
Requirements Evolution is considered one of the most critical issues in developing computer-based systems. Despite the recognised role of requirements in Software Engineering, Req...
Network measurement has shown that a specific IP address prefix may be announced by more than one autonomous system (AS), a phenomenon commonly referred to as Multiple Origin AS...
Xiaoliang Zhao, Dan Pei, Lan Wang, Daniel Massey, ...