Security functions such as access control, encryption and authentication are typically left up to applications on the modern Internet. There is no unified system to implement thes...
Computer systems are constantly under the threats of being attacked and in many cases these attacks succeed. Today's networked systems are thus built to be intrusion tolerant....
The Olfactory Receptor Database (ORDB) is a WWWaccessible database that has been expanded from an olfactory receptor resource to a chemoreceptor resource. It stores data on six cl...
Emmanouil Skoufos, Luis N. Marenco, Prakash M. Nad...
Abstract—This paper explores the behavior similarity of Internet end hosts in the same network prefixes. We use bipartite graphs to model network traffic, and then construct on...
ct In this paper, we describe the VesaliusTM Project, a multi-modal collection of anatomical resourcesunder development at Columbia University. 1 Our focus is on the need for navig...