In this paper we describe a new class of tools for protecting computer systems from security attacks. Their distinguished feature is the principle they are based on. Host or netwo...
Honeypots are computer systems that try to fool cyberattackers into thinking they are ordinary computer systems, when in fact they are designed solely to collect data about attack...
Background: Simulating the major molecular events inside an Escherichia coli cell can lead to a very large number of reactions that compose its overall behaviour. Not only should ...
Marco A. J. Iafolla, Guang Qiang Dong, David R. Mc...
Abstract. People consider other people who resemble them to be more persuasive. Users may consider embodied conversational agents, or ECAs, to be more persuasive if the agents rese...
Ian Li, Jodi Forlizzi, Anind K. Dey, Sara B. Kiesl...
This paper proposes a dynamic scheduler that supports the coexistence of guaranteed and non-guaranteed bandwidth servers to efficiently handle soft-tasks’ overloads by making a...