Over the last decade, there has been a significant increase in the number and sophistication of malware-related attacks and infections. Many detection techniques have been propos...
Davide Canali, Andrea Lanzi, Davide Balzarotti, Ch...
The Infrastructure of modern society is controlled by software systems that are vulnerable to attack. Successful attacks on these systems can lead to catastrophic results; the sur...
Interactive multimedia sessions have uncertain, varying consumption rates due to users' interactive behavior. In this paper, we propose two approaches for prediction of consu...
Children with autism often exhibit self-stimulatory (or “stimming”) behaviors. We present an on-body sensing system for continuous recognition of stimming activity. By creatin...
Tracy L. Westeyn, Kristin Vadas, Xuehai Bian, Thad...
We describe a framework and equations used to model and predict the behavior of multi-agent systems (MASs) with learning agents. A difference equation is used for calculating the ...