Queries issued by casual users or specialists exploring a data set often point us to important subsets of the data, be it clusters, outliers or other features of particular import...
This paper describes the work of a team of researchers in computer graphics, geometric computing, and civil engineering to produce a visualization of the September 2001 attack on ...
Voicu Popescu, Chris Hoffmann, Sami Kilic, Mete So...
As a large quantity of information is presented in XML format on the Web, there are increasing demands for XML security. Until now, research on XML security has been focused on th...
Abstract – To bring QoS to the Internet, several better-thanbest-effort network services have been recently devised with significant efforts. The goal of this paper is to measure...
Phil Wang, Yechiam Yemini, Danilo Florissi, John A...
Abstract. To guarantee the security of computer systems, it is necessary to define security permissions to restrict the access to the systems' resources. These permissions enf...