Abstract. A range of attacks on network components, such as algorithmic denial-of-service attacks and cryptanalysis via timing attacks, are enabled by data structures for which an ...
Background: Investigators in the biological sciences continue to exploit laboratory automation methods and have dramatically increased the rates at which they can generate data. I...
Michael C. Wendl, Scott Smith, Craig S. Pohl, Davi...
In this paper, we analyze the convergence of an iterative selftraining semi-supervised support vector machine (SVM) algorithm, which is designed for classi cation in small trainin...
SNP provides a high-level abstraction for secure end-toend network communications. It supports both stream and datagram semantics with security guarantees (e.g., data originauthen...
Thomas Y. C. Woo, Raghuram Bindignavle, Shaowen Su...
This paper reports the design, implementation, and application of a new interface for augmenting performance and play on the low flying trapeze. Sensors were used to gauge the moti...
Anne Hoekstra, Christoph Bartneck, Michael J. Lyon...