This paper introduces a new architecture for automating the generalization of program structure and the recognition of common patterns in the area of malware analysis. By using ma...
In Internet based commerce, sellers often use multiple distribution channels for the sale of standard consumer goods. We study a model of second degree price discrimination in whi...
While mobile phones have become ubiquitous instruments of communication and social interaction, they still require explicit interaction, placing high demands on attention. Engagin...
Lisa Cowan, William G. Griswold, Louise Barkhuus, ...
One of the challenges facing system e-government security professionals is the laborious task of sifting through numerous log files in an attempt to identify malicious traffic and...
Geographic information retrieval (GIR) is, as a branch of traditional information retrieval, a discipline that tries to enrich data with geographical information to make it suitab...
This paper presents the case of Arinia, a custommade piece of social software with strong similarities to today’s microblogging applications. Arinia has been in use in a medium-...
It is generally acknowledged that macroinvertebrates are good indicators of water quality in streams, as a number of taxa are sensitive to pollution and integrate their response t...
Numerous recent papers have found important relationships between network structure and risks within networks. These results indicate that network structure can dramatically affec...
Paul Hines, Seth Blumsack, E. Cotilla Sanchez, C. ...
We examine IT innovation processes and associated effects on industrial automation for a global supplier of high-technology automation equipment (ABB) and their customer (LKAB), a...