Recommendation systems exist to help users discover content in a large body of items. An ideal recommendation system should mimic the actions of a trusted friend or expert, produc...
Documents are recommended by computer-based systems normally according to their prominence in the document reference network. Based on the requirements identified in a concrete u...
Although the Internet provides nonprofit organizations with unprecedented opportunities for fundraising, the volume of online donations has been miniscule. Since one reason for th...
Abstract. Recent research demonstrates that adversaries can inject malicious code into a peripheral’s firmware during a firmware update, which can result in password leakage or...
Privilege separation partitions a single program into two parts: a privileged program called the monitor and an unprivileged program called the slave. All trust and privileges are...