The call stack of a program execution can be a very good information source for intrusion detection. There is no prior work on dynamically extracting information from call stack a...
Henry Hanping Feng, Oleg M. Kolesnikov, Prahlad Fo...
In this paper we focus on an important source of problem– difficulty in (online) dynamic optimization problems that has so far received significantly less attention than the tr...
This paper presents a very efficient algorithm for performance-driven topology design for interconnects. Given a net, it first generates A-tree1 topology using table lookup and net...
Purpose – How companies can become better at knowing what they know, and share what they know have in recent years become dominant fields of research within knowledge managemen...
Learning to program is a unique experience for each student, and it is not fully understood why one person in an introductory programming course learns to program better and more ...
Vennila Ramalingam, Deborah LaBelle, Susan Wiedenb...