Abstract. Autonomous spreading malware in the form of bots or worms is a constant threat in today’s Internet. In the form of botnets, networks of compromised machines that can be...
York University participated in the TREC 2008 Blog track, by introducing two opinion finding features. By initially focusing solely on the sentiment terms found in a document, usi...
The Multimedia and Information Systems group at the Knowledge Media Institute of the Open University participated in the Expert Search and Document Search tasks of the Enterprise ...
Recently, a universally composable framework for RFID authentication protocols providing availability, anonymity, and authenticity was proposed. In this paper we extend that frame...
Sensing the state of the environment is an important source for context-aware applications. Several approaches exist to provide sensor information to mobile application nodes. As ...