Authentication in public spaces is a risky task. Frauds on cash machines (ATMs) are not uncommon nowadays. The biggest group of attacks is observation attacks, which focus on reco...
Alexander De Luca, Emanuel von Zezschwitz, Heinric...
Parallel programming is a requirement in the multi-core era. One of the most promising techniques to make parallel programming available for the general users is the use of parall...
Angeles G. Navarro, Rafael Asenjo, Siham Tabik, Ca...
The non-blocking work-stealing algorithm of Arora, Blumofe, and Plaxton (henceforth ABP work-stealing) is on its way to becoming the multiprocessor load balancing technology of ch...
This paper proposes an unusual event recognition algorithm, which is a part of a mobile alarm system. Our systems focus on unusual event. When the system detects the unusual event,...
Soo Yeong Kwak, Guntae Bae, Kil-Cheon Kim, Hyeran ...
With the growing trend towards the use of web applications the danger posed by cross site scripting vulnerabilities gains severity. The most serious threats resulting from cross si...