Credit risk has always been an important issue for banks
and other financial intermediaries. A reliable and consistent
computing system is necessary to simplify the decision
mak...
S. Bonura, V. Morreale, G. Cammarata, F. Cantore,...
A Shrew attack, which uses a low-rate burst carefully designed to exploit TCP’s retransmission timeout mechanism, can throttle the bandwidth of a TCP flow in a stealthy manner....
To facilitate accurate and efficient detection of motion
patterns in video data, it is desirable to abstract from pixel
intensity values to representations that explicitly and co...
Advertising has become an integral and inseparable part of the World Wide Web. However, neither public auditing nor monitoring mechanisms still exist in this emerging area. In thi...
Yong Wang, Daniel Burgener, Aleksandar Kuzmanovic,...
As sensing technologies become increasingly distributed and democratized, citizens and novice users are becoming responsible for the kinds of data collection and analysis that have...
Wesley Willett, Paul M. Aoki, Neil Kumar, Sushmita...