The Infrastructure of modern society is controlled by software systems that are vulnerable to attacks. Many such attacks, launched by "recreational hackers" have already...
Howard E. Shrobe, Robert Laddaga, Robert Balzer, N...
Background: Recent advances with high-throughput methods in life-science research have increased the need for automatized data analysis and visual exploration techniques. Sophisti...
This paper describes a mode detection system for online pen input that employs a Bayesian network to combine classification results and context information. Previous monolithic c...
—Computer systems often reach a point at which the relative cost to increase some tunable parameter is no longer worth the corresponding performance benefit. These “knees” t...
Ville Satopaa, Jeannie R. Albrecht, David Irwin, B...
—To detect misbehavior on data and mitigate adverse effects, we propose and evaluate a MultipAth Routing Single path transmission (MARS) scheme. The MARS combines multipath routi...