Phishing is a form of identity theft in which an attacker attempts to elicit confidential information from unsuspecting victims. While in the past there has been significant work ...
This paper attempts to address the complexity of system administration by making the labor of applying software updates independent of the number of computers on which the softwar...
Constantine P. Sapuntzakis, David Brumley, Ramesh ...
The purpose of Project Pioneer is to develop an exploratory robot capable of creating a three-dimensional photo-realistic map of the inside of the damaged Chornobyl Nuclear Reacto...
Fitzgerald Steele Jr., Geb W. Thomas, Theodore Bla...
View materialization is known to be a valuable technique for performance optimization in relational databases, and much work has been done addressing the problem of consistently m...
Abstract. XML views can be used in Web applications to resolve incompatibilities among heterogeneous XML sources. They allow to reduce the amount of data that a user has to deal wi...
Hanna Kozankiewicz, Jacek Leszczylowski, Kazimierz...