— Active worms spread in an automated fashion and can flood the Internet in a very short time. Modeling the spread of active worms can help us understand how active worms spread...
This paper presents our work on automatically locating charts from document pages, which is an important stage in the chart image recognition and understanding system being develo...
Visualization techniques are commonly used in computer science, particularly for understanding the interactions intrinsic in the object-oriented paradigm. The visualization effect...
The convergence of mobile technology and e-learning has generated considerable excitement among both practitioners and academics. Mass media continually promotes novel idea about m...
Remote code-injection attacks are one of the most frequently used attacking vectors in computer security. To detect and analyze injected code (often called shellcode), some researc...