Attacks often exploit memory errors to gain control over the execution of vulnerable programs. These attacks remain a serious problem despite previous research on techniques to pr...
As data mining evolves and matures more and more businesses are incorporating this technology into their business practices. However, currently data mining and decision support so...
Ken W. Collier, Donald Sautter, Curt Marjaniemi, B...
People now easily share digital photos outside the home via web publishing and gift-giving. Yet within the home, digital photos are hard to access and lack the physical affordance...
The types of police inquiries performed these days are incredibly diverse. Often data processing architectures are not suited to cope with this diversity since most of the case dat...
Jonas Poelmans, Paul Elzinga, Stijn Viaene, Guido ...
We investigate the decision process as applied to the practical task of choosing a financial portfolio. We developed PortfolioCompare, an interactive visual analytic decision sup...
Anya Savikhin, Hon Cheong Lam, Brian D. Fisher, Da...