Binary Decision Diagrams (BDDs) have recently become widely accepted as a space-efficient method of representing relations in points-to analyses. When BDDs are used to represent re...
Ad hoc and peer-to-peer (P2P) computing paradigms pose a number of security challenges. The deployment of classic security protocols to provide services such as node authentication...
Esther Palomar, Almudena Alcaide, Juan M. Est&eacu...
Outsourcing of work to support software development and services is seen primarily as a transfer of labor to another shore. But intellectual property, as software, is transferred a...
Gio Wiederhold, Amar Gupta, Rajat Mittal, Erich J....
The paper develops a novel computational framework for predicting communication flow in social networks based on several contextual features. The problem is important because pred...
Munmun De Choudhury, Hari Sundaram, Ajita John, Do...
— In this paper we report our progress in building a system for the acquisition, analysis, and visualization of a collection of Native Californian baskets from the Phoebe A. Hear...