We propose a kind of agent called probe-agent, which is responsible to collect and monitor the data and information according to its goals. On the other hand, it can summarize the ...
This paper presents a graph-theoretical approach to lexical disambiguation on word co-occurrences. Producing a dictionary similar to WordNet, this method is the counterpart to word...
In the last decade, a great many code clone detection tools have been proposed. Such a large number of tools calls for a quantitative comparison, and there have been several attem...
In this paper we explore the problem of creating vulnerability signatures. A vulnerability signature matches all exploits of a given vulnerability, even polymorphic or metamorphic...
David Brumley, James Newsome, Dawn Xiaodong Song, ...
Researches about multi-radio mesh networks have mostly focused on channel allocation under internal interference. However, the deployment of WMNs in unlicensed bands of dense urban...
Wooseong Kim, Andreas J. Kassler, Marco Di Felice,...