Understanding the strategies of attacks is crucial for security applications such as computer and network forensics, intrusion response, and prevention of future attacks. This pap...
Significant temporal and monetary costs are associated with the development and implementation of a knowledge management system (KMS). To justify this investment, it is important ...
Nicole F. Velasquez, Alexandra Durcikova, Rajiv Sa...
Multithreading has been proposed as an architectural strategy for tolerating latency in multiprocessors and, through limited empirical studies, shown to offer promise. This paper ...
Rafael H. Saavedra-Barrera, David E. Culler, Thors...
Recently, the publish-subscribe communication model has attracted the attention of developers as a viable alternative to traditional communication schemas, like request/reply, for...
Over the last several years, a new probabilistic representation for 3-d volumetric modeling has been developed. The main purpose of the model is to detect deviations from the norm...