In this article we explore the short and largely undocumented history of electronic government, discuss the literature of e-government at the local government level, and document ...
Stephen H. Holden, Donald F. Norris, Patricia D. F...
This paper describes a novel approach using Hidden Markov Models (HMM) to detect complex Internet attacks. These attacks consist of several steps that may occur over an extended pe...
Dirk Ourston, Sara Matzner, William Stump, Bryan H...
This paper presents a new method to control the delay performance for high rate heterogeneous real-time traffic flows based on a novel traffic control algorithm which is a gene...
crystallographic results were made available through the Protein Data Bank (PDB) (entries: ITUB and IJFF) which allowed us to view the 3D atomic resolution structure oftubulin. (se...
J. A. Tuszynski, E. J. Carpenter, E. Crawford, J. ...
Aggressive hardware-based and software-based prefetch algorithms for hiding memory access latencies were proposed to bridge the gap of the expanding speed disparity between proces...