Given a program and an assertion in that program, determining if the assertion can fail is one of the key applications of program analysis. Symbolic execution is a well-known techn...
Botnets, networks of malware-infected machines that are controlled by an adversary, are the root cause of a large number of security problems on the Internet. A particularly sophi...
Brett Stone-Gross, Marco Cova, Bob Gilbert, Richar...
Since its inception in 1994, The RNA Modification Database (RNAMDB, http://rna-mdb.cas.albany. edu/RNAmods/) has served as a focal point for information pertaining to naturally oc...
William A. Cantara, Pamela F. Crain, Jef Rozenski,...
This demo presents a privacy-preserving aggregate location monitoring system, namely, TinyCasper, in which we can monitor moving objects in wireless sensor networks while preservi...
We present two theses in this paper: First, performance of most existing face recognition algorithms improves if instead of the whole image, smaller patches are individually class...
Ritwik Kumar, Arunava Banerjee, CISE, Univ, Baba V...