This paper develops a methodology for analyzing and predicting the impact category of malicious code, particularly email worms. The current paper develops two frameworks to classi...
Insu Park, Raj Sharman, H. Raghav Rao, Shambhu J. ...
Locusts possess a bilateral pair of uniquely identifiable visual neurons that respond vigorously to the image of an approaching object. These neurons are called the lobula giant m...
Shigang Yue, Roger D. Santer, Yoshifumi Yamawaki, ...
Verification and validation techniques often generate various forms of software development artifacts. Change records created from verification and validation efforts show how fil...
In this paper, we present a novel system for selling bundles of news items. Through the system, customers bargain with the seller over the price and quality of the delivered goods...
D. J. A. Somefun, Enrico Gerding, Sander M. Bohte,...
This article describes an ontological model of norms. The basic assumption is that a substantial part of a legal system is grounded on the concept of agency. Since a legal system a...