Abstract-Malicious attacks against power system state estimation are considered. It has been recently observed that if an adversary is able to manipulate the measurements taken at ...
Oliver Kosut, Liyan Jia, Robert J. Thomas, Lang To...
Music librarians and cataloguers have traditionally created indexes that allow users to access musical works using standard reference information, such as the name of the composer...
The new social media sites--blogs, wikis, Flickr and Digg, among others--underscore the transformation of the Web to a participatory medium in which users are actively creating, e...
Finding out about a topic online can be time consuming. It involves visiting multiple news sites, encyclopedia entries, video repositories and other resources while discarding irr...
Francisco Iacobelli, Kristian J. Hammond, Larry Bi...
Access modifiers like public and private let the programmer control the accessibility of class members. Restricted accessibility supports encapsulation, i.e., the hiding of impleme...