The current Internet architecture allows malicious nodes to disguise their origin during denial-of-service attacks with IP spoofing. A well-known solution to identify these nodes...
Rafael P. Laufer, Pedro B. Velloso, Daniel de Oliv...
—In the environments where heterogeneous devices need to share information, utilize services of each other, and participate as components in various smart applications, it is com...
—Currently the user’s web search is disjoint from the resources which is subsequently browsed. Specifically the related instances of the search are not displayed on the followi...
Kevin Koidl, Owen Conlan, Lai Wei, Ann Marie Saxto...
In this paper we introduce the Inverted Browser, a novel approach to enable mobile users to view content from their personal devices on public displays. The Inverted Browser is a ...
Mandayam T. Raghunath, Nishkam Ravi, Marcel-Catali...
Medicine, psychology and quality of life literature all point to the importance of not just asking ‘how are you?’, but assessing and being aware of self and others’ well-bei...