Software system analysis for extracting system functionality remains as a major problem in the reverse engineering literature and the early approaches mainly rely on static proper...
In this paper we present a DSR-based multi-path Routing protocol, which has been developed for transmission of Multiple Description Coded (MDC) packets in wireless ad-hoc network ...
The information management requirements in systems based on Web Service Architecture principles include both the management of large amounts of relatively static services and assoc...
Verification of legitimate access of documents, which is one aspect of the umbrella of problems in the Insider Threat category, is a challenging problem. This paper describes the r...
Boanerges Aleman-Meza, Phillip Burns, Matthew Eave...
It is generally believed that data mining results do not violate the anonymity of the individuals recorded in the source database. In fact, data mining models and patterns, in orde...
Maurizio Atzori, Francesco Bonchi, Fosca Giannotti...