During the past decade, a number of different studies have identified several peculiar properties of networks that arise from a diverse universe, ranging from social to computer n...
Pedram Pedarsani, Daniel R. Figueiredo, Matthias G...
Abstract Within the home, digital photos lack the physical affordances that make collocated photo-sharing easy and opportunistic. Family members have difficulty accessing the perso...
Can implicit interaction with a computer easily drive useful interface improvements in physical world settings? This paper presents a case study presenting multiple such context-a...
Most intrusion detection systems apply the misuse detection approach. Misuse detection compares recorded audit data with predefined patterns denoted as signatures. A signature is ...
Large-scale distributed data management with P2P systems requires the existence of similarity operators for queries as we cannot assume that all users will agree on exactly the sa...