Early work on security-typed languages required that legal information flows be defined statically. More recently, techniques have been introduced that relax these assumptions a...
Sruthi Bandhakavi, William H. Winsborough, Mariann...
—In a distributed wireless network, it is possible to employ several relays and mimic a multiple antenna transmission system. In this paper we propose a MAC layer solution that a...
Pei Liu, Yuanpeng Liu, Thanasis Korakis, Anna Scag...
We examine the recent information visualization phenomenon known as tag clouds, which are an interesting combination of data visualization, web design element, and social marker. ...
Peer-to-Peer (P2P) networks have proven to be an efficient and successful mechanism for file sharing over the Internet. However, current P2P protocols have long worst case query...
Abstract. User-to-user similarity is a fundamental component of Collaborative Filtering (CF) recommender systems. In user-to-user similarity the ratings assigned by two users to a ...