— Peer-to-peer systems are becoming increasingly popular, with millions of simultaneous users and a wide range of applications. Understanding existing systems and devising new pe...
Daniel Stutzbach, Reza Rejaie, Nick G. Duffield, S...
An SQL injection attack targets interactive web applications that employ database services. Such applications accept user input, such as form fields, and then include this input ...
Gregory Buehrer, Bruce W. Weide, Paolo A. G. Sivil...
Abstract. Structure-oriented approaches in clone detection have become popular in both code-based and model-based clone detection. However, existing methods for capturing structura...
Hoan Anh Nguyen, Tung Thanh Nguyen, Nam H. Pham, J...
When equipped with kernel functions, online learning algorithms are susceptible to the "curse of kernelization" that causes unbounded growth in the model size. To addres...
Abstract. To study the relationship between the levels of chemical pollutants and the number of daily total hospital admissions for respiratory diseases and to find the effect of t...