This paper presents a new approach for automatic concept extraction, using grammatical parsers and Latent Semantic Analysis. The methodology and tool used to build the benchmarkin...
— By monitoring the exchanged IPsec traffic an adversary can usually easily discover the layout of virtual private networks (VPNs). Of even worse extend is the disclosure if com...
Michael Brinkmeier, Michael Rossberg, Guenter Scha...
—The key idea of dynamic spectrum access (DSA) networks is to allow the secondary, unlicensed users to detect and use unused portions of the spectrum (white spaces) opportunistic...
—Multiaccess mobile devices and overlapping wireless network deployments have emerged as a next generation network fixture. To make the most of all available networks, mobile de...
Recent work has shown that certain handwriting biometrics are susceptible to forgery attacks, both human- and machine-based. In this paper, we examine a new scheme for using handw...