In this paper, we are interested in the relationship between final prices of online auctions and possible shill activities during those auctions. We conduct experiments on real auc...
Topic hierarchies are very useful for managing, searching and browsing large repositories of text documents. The hierarchical clustering methods are used to support the constructi...
Given the bytecode of a software system, is it possible to automatically generate attack signatures that reveal its vulnerabilities? A natural solution would be symbolically execu...