Malicious software in form of Internet worms, computer viruses, and Trojan horses poses a major threat to the security of networked systems. The diversity and amount of its variant...
Konrad Rieck, Thorsten Holz, Carsten Willems, Patr...
The people in an image are generally not strangers, but instead often share social relationships such as husband-wife, siblings, grandparent-child, father-child, or mother-child. F...
Gang Wang, Andrew C. Gallagher, Jiebo Luo, David A...
We describe the design and field evaluation of the Serendipitous Family Stories system, a web and mobile service that allows for videos to be saved in user-specified real-world lo...
Frank R. Bentley, Santosh Basapur, Sujoy Kumar Cho...
We study a new family of geometric graphs that interpolate between the Delaunay triangulation and the Gabriel graph. These graphs share many properties with skeletons for [0, 1]...
This paper considers the problem of guessing the realization of a finite alphabet source when some side information is provided. The only knowledge the guesser has about the source...