Abstract—This paper describes our work on developing technology for rapidly assembling information portals that provide integrated access to and analysis of information from mult...
Yiming Ma, Dmitri V. Kalashnikov, Ramaswamy Hariha...
— Often document dissemination is limited to a “need to know” basis so as to better maintain organizational trade secrets. Retrieving documents that are off-topic to a user...
—We address the problem of planning patrol routes to maximize coverage of important locations (hot spots) at minimum cost (length of patrol route). We model a road network using ...
—A digital chain of custody is an account documenting digital data at a particular place and time. This paper gives a method of validating and authenticating a digital chain of c...
— In this paper we define a new metric for quantifying the degree of anonymity collectively afforded to users of an anonymous communication system. We show how our metric, based...
– The difficulty in managing security threats and vulnerabilities for small and medium-sized enterprises (SME) is investigated. A detailed conceptual framework for asset and thre...
— Surveillance is an important task for guaranteeing the security of individuals. Being able to intelligently monitor the activity in given spaces is essential to achieve such su...
—A Weblog is a Web site where entries are made in diary style, maintained by its sole author – a blogger, and displayed in a reverse chronological order. Due to the freedom and...
Abstract—Public communication during natural and manmade disasters is a key issue that must be addressed to protect lives and properties. The choice of the best protective action...