Phishing emails are semantic attacks that con people into divulging sensitive information using techniques to make the user believe that information is being requested by a legiti...
Julie S. Downs, Mandy B. Holbrook, Lorrie Faith Cr...
Abstract— Robot vision systems notoriously require large computing capabilities, rarely available on physical devices. Robots have limited embedded hardware, and almost all senso...
Roberto Pirrone, Giuseppe Careri, F. Saverio Fabia...
Abstract Grid services can be composed into processes, providing a high level definition of the computations involved in terms of their data exchanges and control flow dependenci...
Thomas Heinis, Cesare Pautasso, Oliver Deak, Gusta...
This paper describes an agent-based recommendation system developed to support knowledge acquisition and sharing processes. Its purpose is to aid the process of community building...
Mauro F. Koyama, Olga Nabuco, Francisco Edeneziano...
Methods for automatically managing the performance of computing services must estimate a performance model of that service. This paper explores properties that are necessary for p...