Abstract. Can we model the temporal evolution of topics in Web image collections? If so, can we exploit the understanding of dynamics to solve novel visual problems or improve reco...
A cost effective attack against multimedia forensics is the multiuser collusion attack, in which several attackers mount attacks collectively to remove traces of the identifying f...
Secure and energy efficient transmission is a main concern in many wireless sensor network applications. In this paper, two types of denial-of-service attacks that affect the rout...
Network worms are a clear and growing threat to the security of today's Internet-connected hosts and networks. The combination of the Internet's unrestricted connectivit...
Sumeet Singh, Cristian Estan, George Varghese, Ste...
The Internet is crucial to business, government, education and many other facets of society and its continuing scalability places serious challenges on the routing system's c...