Kernel-level rootkits affect system security by modifying key kernel data structures to achieve a variety of malicious goals. While early rootkits modified control data structur...
Abstract—To achieve scalability, energy-efficiency, and timeliness, wireless sensor network deployments increasingly employ in-network processing. In this paper, we identify sin...
In this paper we present a novel approach to text input on large interactive surfaces using a combination of strategies to resolve the inherent difficulties with text input on su...
Johannes Hirche, Peter Bomark, Mikael Bauer, Pawel...
Publish/subscribe networks provide an interface for publishers to perform many-to-many communication to subscribers without the inefficiencies of broadcasting. Each subscriber sub...
Abstract. The key for providing a robust context for personalized information retrieval is to build a library which gathers the long term and the short term user’s interests and ...