Code sandboxing is useful for many purposes, but most sandboxing techniques require kernel modifications, do not completely isolate guest code, or incur substantial performance co...
Abstract. This paper presents an online learning algorithm for appearancebased gaze estimation that allows free head movement in a casual desktop environment. Our method avoids the...
We apply advanced agent trust modeling techniques to identify malicious traffic in computer networks. Our work integrates four state-of-the-art techniques from anomaly detection,...
Abstract Requirements Engineering (RE) research often ignores, or presumes a uniform nature of the context in which the system operates. This assumption is no longer valid in emerg...
It is important for managers and Information Technology professionals to understand data-driven decision support systems and how such systems can provide business intelligence and ...