Today's enterprise databases are large and complex, often relating hundreds of entities. Enabling ordinary users to query such databases and derive value from them has been o...
In this work we show that once a single peer-to-peer (P2P) bot is detected in a network, it may be possible to efficiently identify other members of the same botnet in the same ne...
WiFi interface is known to be a primary energy consumer in mobile devices, and idle listening (IL) is the dominant source of energy consumption in WiFi. Most existing protocols, s...
One of the most popular student modeling techniques currently available is Constraint Based Modeling (CBM), which is based on Ohlsson's theory of learning from performance err...
This work presents a user position management system for Wi-Fi networks. The location system is based on access point coverage range and beacon devices. The implementation was mad...
Andrei Oliveira da Silva, Paulo Henrique de Souza ...