This work explores issues of computational disclosure control. We examine assumptions in the foundations of traditional problem statements and abstract models. We offer a comprehe...
Rick Crawford, Matt Bishop, Bhume Bhumiratana, Lis...
Phylogenetic profiles of proteins − strings of ones and zeros encoding respectively the presence and absence of proteins in a group of genomes − have recently been used to iden...
Scientists within Geoscience Australia (GA) create complex 3D models of geological structures, using specialised 3D modelling software. Very few people outside GA have access to t...
The ever increasing speed of Internet connections has led to a point where it is actually possible for every end user to seamlessly share data on Internet. Peer-To-Peer (P2P) netw...
Recent research has proposed self-checksumming as a method by which a program can detect any possibly malicious modification to its code. Wurster et al. developed an attack again...
Jonathon T. Giffin, Mihai Christodorescu, Louis Kr...