Abstract-- Affective information is vital for effective human-tohuman communication. Likewise, human-to-computer communication could be potentiated by an "affective barometer&...
Abdul Rehman Abbasi, Matthew N. Dailey, Nitin V. A...
Vulnerability scanning is one of the proactive information security technologies in the Internet and network security domain. However, the current vulnerability scanner (VS) produ...
SSH is a widely used application that provides secure remote login. It uses strong cryptography to provide authentication and confidentiality. The IETF SecSH working group is deve...
Multi-user environments, using 3D graphics, more and more find their way into areas like e-business, entertainment and cooperative work. Due to the increasing capabilities of hard...
Sensor networks and other distributed information systems (such as the Web) must frequently access data that has a high per-attribute acquisition cost, in terms of energy, latency...
Amol Deshpande, Carlos Guestrin, Wei Hong, Samuel ...