ID uniqueness is essential in DHT-based systems as peer lookup and resource searching rely on IDmatching. Many previous works and measurements on Kad do not take into account that...
Jie Yu, Chengfang Fang, Jia Xu, Ee-Chien Chang, Zh...
Abstract. In order to detect a compromise of a running process based on it deviating from its program’s normal system-call behavior, an anomaly detector must first be trained wi...
In this paper, we propose a Semantic Graphs for Image Search (SGIS) system, which provides a novel way for image search by utilizing collaborative knowledge in Wikipedia and netwo...
We consider the problem of assisting vulnerable people and their carers to reduce the occurrence, and concomitant consequences, of accidents in the home. A wireless sensor network ...
Hamid K. Aghajan, Juan Carlos Augusto, Chen Wu, Pa...
The popularity of distributed learning and the continued growth in the number of colleges and universities offering courses delivered entirely via asynchronous learning networks (...