In defending against various network attacks, such as distributed denial-of-service (DDoS) attacks or worm attacks, a defense system needs to deal with various network conditions a...
Cliff Changchun Zou, Nick G. Duffield, Donald F. T...
One important class of Data Mining applications is the so-called "Web Mining" that analyzes and extracts important and non-trivial knowledge from Web related data. Typic...
Bamshad Mobasher, Robert Cooley, Jaideep Srivastav...
We present a new methodology for proving security of encryption systems using what we call Dual System Encryption. Our techniques result in fully secure Identity-Based Encryption ...
Quantum computation deals with projective measurements and unitary transformations in finite dimensional Hilbert spaces. The paper presents a propositional logic designed to descr...
In this paper we present a system for topologically localizing a mobile robot using color histogram matching of omnidirectional images. The system is intended for use as a navigat...