—The problem of active shielding of some domains from the effect of the sources distributed in other domains is considered. The problem can be formulated either in a bounded dom...
Drive-by download attacks are among the most common methods for spreading malware today. These attacks typically exploit memory corruption vulnerabilities in web browsers and brows...
Manuel Egele, Peter Wurzinger, Christopher Kruegel...
In this paper we apply three Neuro-Evolution (NE) methods as controller design approaches in a collective behavior task. These NE methods are Enforced Sub-Populations, MultiAgent ...
There has usually been a clean separation between networks and the applications that use them. Applications send packets over a simple socket API; the network delivers them. Howev...
Kok-Kiong Yap, Te-Yuan Huang, Ben Dodson, Monica S...
The performance of haptic application is highly sensitive to communication delays and losses of data. It implies several constraints in developing networked haptic applications. Th...