While recent research has advanced our understanding about the structure and dynamics of social tagging systems, we know little about (i) the underlying motivations for tagging (w...
This paper addresses the problem of determining the node locations in ad-hoc sensor networks when only connectivity information is available. In previous work, we showed that the ...
Remotely-launched software exploits are a common way for attackers to intrude into vulnerable computer systems. As detection techniques improve, remote exploitation techniques are...
Qinghua Zhang, Douglas S. Reeves, Peng Ning, S. Pu...
The human face is one of the most important objects in videos since it provides rich information for spotting certain people of interest, such as government leaders in news video,...
Thao Ngoc Nguyen, Thanh Duc Ngo, Duy-Dinh Le, Shin...
: Because digital libraries are expensive to create and maintain, Internet analogs of public libraries--reliable, quality, community services--have only recently begun to appear. A...
Ian H. Witten, Craig G. Nevill-Manning, Sally Jo C...