`Modelling inside GIS' has been widely researched over the years. This paper argues that such approach lacks appropriate model reusing and management functions because it is ...
A secure content distribution system is prototyped based on run-time partial reconfigurability of an FPGA. The system provides a robust content protection scheme for online conten...
For the last few years, many commodity computers have come equipped with a Trusted Platform Module (TPM). Existing research shows that the TPM can be used to establish trust in th...
Machine learning has great utility within the context of network intrusion detection systems. In this paper, a behavior analysis-based learning framework for host level network in...
Haiyan Qiao, Jianfeng Peng, Chuan Feng, Jerzy W. R...
Previous research has addressed the scalability and availability issues associated with the construction of cluster-based network services. This paper studies the clustering of re...
Kai Shen, Tao Yang, Lingkun Chu, JoAnne Holliday, ...