The growing sophistication and diversity of malicious activity in the Internet presents a serious challenge for network security analysts. In this paper, we describe our efforts t...
Bee-Chung Chen, Vinod Yegneswaran, Paul Barford, R...
The paper gives an overview of recent developments in Sweden concerning the communication and reception of the Open Access concept and the growth and co-ordination of digital acad...
Abstract: File-sharing in mobile networks has differing demands to a P2P architecture. Resource access and mediation techniques must follow constraints given in 2.5G/3G networks. E...
Frank-Uwe Andersen, Hermann de Meer, Ivan Dedinski...
— This paper analyzes the potential to apply mobile service robots in offshore oil and gas producing environments. The required hardware and software components and abilities of ...
Matthias Bengel, Kai Pfeiffer, Birgit Graf, Alexan...
Abstract. The majority of humans today carry mobile telephones. These phones automatically capture behavioral data from virtually every human society, stored in service provider da...