Threat modeling analyzes how an adversary might attack a system by supplying it with malicious data or interacting with it. The analysis uses a Data Flow Diagram (DFD) to describe...
Video Paper is a prototype system for multimedia browsing, analysis, and replay. Key frames extracted from a video recording are printed on paper together with bar codes that allo...
Jamey Graham, Berna Erol, Jonathan J. Hull, Dar-Sh...
Spam filters often use the reputation of an IP address (or IP address range) to classify email senders. This approach worked well when most spam originated from senders with fix...
Anirudh Ramachandran, Nick Feamster, Santosh Vempa...
Background: Cluster analysis is an important technique for the exploratory analysis of biological data. Such data is often high-dimensional, inherently noisy and contains outliers...
Benjamin Georgi, Ivan Gesteira Costa, Alexander Sc...
Background: Affymetrix GeneChip microarrays are popular platforms for expression profiling in two types of studies: detection of differential expression computed by p-values of t-...
Jakub Mieczkowski, Magdalena E. Tyburczy, Michal D...