Abstract. Attackers in particular botnet controllers use stealthy messaging systems to set up large-scale command and control. Understanding the capacity of such communication chan...
Wireless mesh sensor networks (WMSNs) have recently gained a lot of interest due to their communication capability to support various applications with different Quality of Service...
Jamila Ben Slimane, Yeqiong Song, Anis Koubaa, Mou...
Comparing humans and machines is one important source of information about both machine and human strengths and limitations. Most of these comparisons and competitions are performe...
Javier Insa-Cabrera, David L. Dowe, Sergio Espa&nt...
vSked is an interactive and collaborative assistive technology for students with autism, combining visual schedules, choice boards, and a token-based reward system into an integra...
Meg Cramer, Sen H. Hirano, Monica Tentori, Michael...
Multivariate outlier identification requires the choice of reliable cut-off points for the robust distances that measure the discrepancy from the fit provided by high-breakdown...