Usually time series prediction is done with regularly sampled data. In practice, however, the data available may be irregularly sampled. In this case the conventional prediction me...
An attempt at determining the source of anomalous network traffic may result in the identification of the networked system where it originated. From a forensic point of view it is...
Connected Kids project is about developing a searchable database system for the disenfranchised people of the city of Troy, New York. The various events and programs for the young...
Distributed Denial-of-Service (DDoS) attacks prevent users from accessing services on the target network by flooding the target network with a large volume of traffic. In this pap...
For a rectilinear Steiner tree T with a root, define its k-th moment Mk(T) = T (dT (u))k du, where the integration is over all edges of T, dT (u) is the length of the unique path ...