In a world of increasing Internet connectivity coupled with increasing computer security risks, security conscious network applications implementing blacklisting technology are be...
Most of today’s computers are connected to the Internet or at least to a local network, exposing system vulnerabilities to the potential attackers. One of the attackers’ goals...
Milena Milenkovic, Aleksandar Milenkovic, Emil Jov...
For humans, it is useful to be able to visually detect an object's physical properties. One potentially important source of information is the way the object moves and intera...
tendees. Extended abstracts ranging from three to four pages in length can be submitted on any relevant topic. Papers will be accepted based on the quality of research and potentia...
This paper addresses two problems: “What are the appropriate methods for evaluating information systems?” and “How do we measure the impact of ambient information systems?...
Xiaobin Shen, Peter Eades, Seok-Hee Hong, Andrew V...