Delay tolerant and mobile ad hoc networks, present considerable challenges to the development of protocols and systems. In particular, the challenge of being able to cope with the...
In this paper we propose a new class of attacks that exploit advertising systems offering microtargeting capabilities in order to breach user privacy. We study the advertising syst...
We present SmallWorlds, a visual interactive graph-based interface that allows users to specify, refine and build item-preference profiles in a variety of domains. The interface f...
Brynjar Gretarsson, John O'Donovan, Svetlin Bostan...
Cyber attacks against networked computers have become relentless in recent years. The most common attack method is to exploit memory corruption vulnerabilities such as buffer ove...
Jun Xu, Peng Ning, Chongkyung Kil, Yan Zhai, Chris...
Clusters of networked, off-the-shelf workstations are currently used for computationintensive, parallel applications. However, it is hardly possible to predict the timing behaviou...