— Increasing number of communication softwares are built on distributed architectures based on the Peer-toPeer (P2P) model, such as Skype [1], and PeerCast [2]. This model provid...
We describe the design and field evaluation of the Serendipitous Family Stories system, a web and mobile service that allows for videos to be saved in user-specified real-world lo...
Frank R. Bentley, Santosh Basapur, Sujoy Kumar Cho...
Recognizing attack plans is one of the goals of security analysts. Attack plan recognition is critical for predicting future actions of attackers, generating possible actions (i.e...
Tatiana Kichkaylo, Tatyana Ryutov, Michael D. Oros...