The efficacy of two evolutionary approaches to the problem of generation of heuristical linear and non-linear evaluation functions in the game of give-away checkers is tested in th...
Most of the security proposals in m-commerce scenarios have been based on a classical payment model, which basically establishes relationships across domains among customers and me...
Distributed Denial of Service (DDoS) attacks exploit the acute imbalance between client and server workloads to cause devastation to the service providers. We propose a distribute...
David Mankins, Rajesh Krishnan, Ceilyn Boyd, John ...
Sensors capable of sensing phenomena at high data rates—on the order of tens to hundreds of thousands of samples per second—are useful in many industrial, civil engineering, s...
Lewis Girod, Yuan Mei, Ryan Newton, Stanislav Rost...
Community Web Portals (e.g., digital libraries, vertical aggregators, infomediaries) have become quite popular nowadays in supporting specific communities of interest on corporate...