In the area of network monitoring a lot of tools are already available to measure a variety of metrics. However, these tools are often limited to a single administrative domain so ...
Andreas Hanemann, Jeff W. Boote, Eric L. Boyd, J&e...
The case-based reasoning approach to email response consists of reusing past messages to synthesize new responses to incoming requests. This task presents various challenges due to...
This paper introduces a ”Diminished Reality” technique for removing an object or collection of objects and replacing it with an appropriate background image. Diminished Realit...
Scenarios are narratives that illustrate future possibilities, such as proposed systems or plans, and help policy makers and designers choose among alternative courses of action. ...
Uncorrupted log files are the critical system component for computer forensics in case of intrusion and for real time system monitoring and auditing. Protection from tampering wit...