When a security incident occurs it is sometimes necessary to identify its causes for legal and cautionary purposes. In an attempt to hide the origin of her connection, a malicious...
Increased complexity of simulation models and the related modeling needs for global supply chains have necessitated the execution of simulations on multiple processors. While dist...
Next generation wireless communications system will be required to support the seamless delivery of voice, video and data with high quality. Delivering hard Quality of Service (QO...
While there have been research efforts in organizing largescale web videos into topics, efficient browsing of web video topics remains a challenging problem not yet addressed. The...
Juan Cao, Chong-Wah Ngo, Yongdong Zhang, Dongming ...
Accuracy and speed are the two most important metrics for Network Intrusion Detection/Prevention Systems (NIDS/NIPSes). Due to emerging polymorphic attacks and the fact that in ma...
Zhichun Li, Gao Xia, Hongyu Gao, Yi Tang, Yan Chen...