Malicious programs spy on users’ behavior and compromise their privacy. Even software from reputable vendors, such as Google Desktop and Sony DRM media player, may perform undes...
Heng Yin, Dawn Xiaodong Song, Manuel Egele, Christ...
We consider the problem of stabilizing a plant with a network of resource constrained wireless nodes. In a companion paper, we developed a protocol where each node repeatedly trans...
Shreyas Sundaram, Miroslav Pajic, Christoforos N. ...
Objectives: We present the summarization system in the PERSIVAL medical digital library. Although we discuss the context of our summarization research within the PERSIVAL platform...
Noemie Elhadad, Min-Yen Kan, Judith L. Klavans, Ka...
Even as they enjoy impressive growth, one of the major challenges facing providers of online services is a high rate of customer turnover. It has adverse impacts on business perfo...
In order to the software and web measurement field becomes a more robust engineering discipline it is mandatory to start reaching a common agreement between researchers and other s...