Abstract. Malware attacks necessitate extensive forensic analysis efforts that are manual-labor intensive because of the analysis-resistance techniques that malware authors employ....
—Throughput optimization in wireless networks with multiple channels and multiple radio interfaces per node is a challenging problem. For general traffic models (given a set of ...
Few web developers have been explicitly trained to create accessible web pages, and are unlikely to recognize subtle accessibility and usability concerns that disabled people face...
Jeffrey P. Bigham, Jeremy T. Brudvik, Bernie Zhang
Smart phones typically support a range of GPS-enabled navigation services. However, most navigation services on smart phones are of limited use to people with visual disabilities....
: paper we present a two-level approach to extend the abstract syntax of models with concrete semantics in order to execute such models. First, a light-weight execution infrastruct...
Christian Motika, Hauke Fuhrmann, Reinhard von Han...