This paper presents a systematic analysis of insider attacks against mobile ad-hoc routing protocols, using the Ad hoc On-Demand Distance Vector (AODV) protocol as an example. It ...
This paper presents an approach to analyze and re-design evaluation methods. The domain explored in this paper is evaluation methods for evaluating fun and entertainment. However,...
This paper argues that the “kindergarten approach to learning” – characterized by a spiraling cycle of Imagine, Create, Play, Share, Reflect, and back to Imagine – is idea...
Snapshot isolation (SI) provides significantly improved concurrency over 2PL, allowing reads to be non-blocking. Unfortunately, it can also lead to non-serializable executions in ...
Sudhir Jorwekar, Alan Fekete, Krithi Ramamritham, ...
Online news reading has become very popular as the web provides access to news articles from millions of sources around the world. A key challenge of news websites is to help user...