In this paper, we consider the problem of identifying and segmenting topically cohesive regions in the URL tree of a large website. Each page of the website is assumed to have a t...
Internet Threat Monitoring (ITM) systems are a widely deployed facility to detect, analyze, and characterize dangerous Internet threats such as worms and distributed denial-of-ser...
Wei Yu, Nan Zhang 0004, Xinwen Fu, Riccardo Bettat...
AMOS (Active Mediators Object System) is an architecture to model, locate, search, combine, update, and monitor data in information systems with many work stations connected using...
Transportation and logistics are fertile areas for modeling. Simulation has traditionally been used in warehousing and inside the distribution center or processing hub in the truc...
John S. Carson II, Mani S. Manivannan, Mark K. Bra...
We propose a surveillance framework (SECRETS: SECure Real-time ElecTronic Surveillance) that is a practical solution to safeguarding sensitive physical facilities like command and ...