P2P systems are highly vulnerable to pollution attacks in which attackers inject multiple versions of corrupted content into the system, which is then further proliferated by unsu...
Rakesh Kumar, David D. Yao, Amitabha Bagchi, Keith...
Abstract. Elderly people are a great repository of knowledge, the majority of which has never been gathered by formal means. In this paper we introduce an application of multi-agen...
Developing an efficient object localization system for complicated industrial objects is an important, yet difficult robotic task. To tackle this problem, we have developed a syst...
A method for Statistical Fault Injection (SFI) into arbitrary latches within a full system hardware-emulated model is validated against particle-beam-accelerated SER testing for a...
Pradeep Ramachandran, Prabhakar Kudva, Jeffrey W. ...
IT governance and strategic alignment are issues that are high on the agenda in many organisations. To address those challenges, it is important that an organisation has a good vi...
Wim Van Grembergen, Steven De Haes, Hilde Van Brem...