While a lot has changed in Internet security in the last 10 years, a lot has stayed the same – such as the use of alphanumeric passwords. Passwords remain the dominant means of a...
Cormac Herley, Paul C. van Oorschot, Andrew S. Pat...
The structural similarity (SSIM) index has been shown to be an useful tool in a wide variety of applications that involve the assessment of image quality and similarity. However, i...
JESP is a tool for statically examining the usage of user thrown exceptions in Java source code. Reported here are the first findings over a dataset of 31 publicly available Java...
Barbara G. Ryder, Donald Smith, Ulrich Kremer, Mic...
Deregulated wholesale markets for bulk electricity supplies are likely to deviate from the perfectly competitive ideal in many areas where transmission losses, costs and capacity ...
In this paper we describe our experiments on a realtime system design, focusing on design alternatives such as scheduling jitter, sensor-to-output latency, intertask communication...
Namyun Kim, Minsoo Ryu, Seongsoo Hong, Manas Sakse...