: Malicious users try to compromise systems using new techniques. One of the recent techniques used by the attacker is to perform complex distributed attacks such as denial of serv...
In many applications, replacing a complex word form by its stem can reduce sparsity, revealing connections in the data that would not otherwise be apparent. In this paper, we focu...
Shane Bergsma, Aditya Bhargava, Hua He, Grzegorz K...
This paper deals with the problem of controlling a robot during a physical interaction through a representation of its tactile system. Although the force feedback has been widely u...
Giorgio Cannata, Simone Denei, Fulvio Mastrogiovan...
The paper considers the complex behavior of a small company in a business ecosystem, time by time leader or supplier or both in one or more supply chains, and points out the data e...
We present Apatite, a new tool that aids users in learning and understanding a complex API by visualizing the common associations between its various components. Current object-or...
Daniel S. Eisenberg, Jeffrey Stylos, Brad A. Myers