Discovery of security vulnerabilities is on the rise. As a result, software development teams must place a higher priority on preventing the injection of vulnerabilities in softwar...
Undergraduate students who perform research benefit greatly from the experience, yet achieving high levels of voluntary participation remains an elusive goal. This paper describes...
This paper describes a novel approach to teaching computer networking through packet traces of actual network traffic. The paper describes a set of exercises that use packet trace...
We propose an hybrid and probabilistic classification of image regions belonging to scenes primarily containing natural objects, e.g. sky, trees, etc. as a first step in solving ...
Unsolicited commercial email is a significant problem for users and providers of email services. While statistical spam filters have proven useful, senders of spam are learning ...