Given an author-conference network that evolves over time, which are the conferences that a given author is most closely related with, and how do they change over time? Large time...
Hanghang Tong, Spiros Papadimitriou, Philip S. Yu,...
Much research on open source software development concentrates on developer lists and other software repositories to investigate what motivates professional software developers to...
Sulayman K. Sowe, Ioannis Stamelos, Lefteris Angel...
Cheap and versatile cameras make it possible to easily and quickly capture a wide variety of documents. However, low resolution cameras present a challenge to OCR because it is vi...
Charles E. Jacobs, Patrice Y. Simard, Paul A. Viol...
Abstract. Intrusion detection systems are quickly becoming a standard requirement in building a network security infrastructure. Although many established techniques and commercial...
Ken Deeter, Kapil Singh, Steve Wilson, Luca Filipo...
Many network intrusion detection systems (NIDS) use byte sequences as signatures to detect malicious activity. While being highly efficient, they tend to suffer from a high false...