In this paper, we present an approach for identity and access management (IAM) in the context of (cross-organizational) serviceoriented architectures (SOA). In particular, we deļ¬...
Waldemar Hummer, Patrick Gaubatz, Mark Strembeck, ...
Many users face surveillance of their Internet communications and a signiļ¬cant fraction suļ¬er from outright blocking of certain destinations. Anonymous communication systems a...
Amir Houmansadr, Giang T. K. Nguyen, Matthew Caesa...
GPS-equipped taxis can be viewed as pervasive sensors and the large-scale digital traces produced allow us to reveal many hidden āfactsā about the city dynamics and human beha...
Daqing Zhang, Nan Li, Zhi-Hua Zhou, Chao Chen, Lin...
āRegular expression matching has become a critical yet challenging technique in content-aware network processing, such as application identification and deep inspection. To meet ...
We study the problem of correlating micro-blogging activity with stock-market events, deļ¬ned as changes in the price and traded volume of stocks. Speciļ¬cally, we collect messa...
Eduardo J. Ruiz, Vagelis Hristidis, Carlos Castill...