This paper concentrates on visualizing computer viruses without using virus specific signature information as a prior stage of the very important problem of detecting computer vi...
Electronic mail has become the most widely-used application for business productivity and communication, yet many people are frustrated with their email. Though email usage has ch...
Dan Gruen, Steven L. Rohall, Suzanne O. Minassian,...
In recent years, the proliferation of VOIP data has created a number of applications in which it is desirable to perform quick online classification and recognition of massive voi...
— A self-healing key distribution scheme enables a large group of users (sensor nodes) to establish a session key dynamically over an unreliable, or lossy wireless network. The m...
Though both quantity and quality of semantic concept detection in video are continuously improving, it still remains unclear how to exploit these detected concepts as semantic ind...