Abstract—With the abundance and ubiquity of mobile devices, a new class of applications is emerging, called participatory sensing (PS), where people can contribute data (e.g., im...
Abstract. Attackers in particular botnet controllers use stealthy messaging systems to set up large-scale command and control. Understanding the capacity of such communication chan...
Prefix hijacking has always been a big concern in the Internet. Some events made it into the international world-news, but most of them remain unreported or even unnoticed. The s...
In this paper we present an application framework that leverages geospatial content on the World Wide Web by enabling innovative modes of interaction and novel types of user inter...
This paper describes the eBag infrastructure, which is a generic infrastructure inspired from work with school children who could bene t from a electronic schoolbag for collaborat...
Christina Brodersen, Bent Guldbjerg Christensen, K...