Drive-by download attacks are among the most common methods for spreading malware today. These attacks typically exploit memory corruption vulnerabilities in web browsers and brows...
Manuel Egele, Peter Wurzinger, Christopher Kruegel...
We propose novel algorithms for organizing large image and video datasets using both the visual content and the associated sideinformation, such as time, location, authorship, and...
Determining the number and location of disulfide bonds within a protein provide valuable insight into the protein’s three-dimensional structure. Purely computational methods tha...
Timothy Lee, Rahul Singh, Ten-Yang Yen, Bruce Mach...
Abstract Bloom filters are extensively used in distributed applications, especially in distributed databases and distributed information systems, to reduce network requirements and...
Odysseas Papapetrou, Wolf Siberski, Wolfgang Nejdl