Tight Error Bounds for Weak Consistent Digital Line Segment Systems
Enabling 3d Applications In Public Cloud
Robust and Interpretable Machine Learning Models for Cancer Outcome Prediction
Efficiently Reconstructing Alert Trees
Static File Path Analysis for Reliable Resource Locating
Operation And Administration Of Access Control In Iot Environments
Towards Automatic Cybersickness Prediction, Detection and Reductions for Virtual Reality Applications
Towards Quantifying Website Maliciousness
Utilizing Deep Neural Networks for Cybersickness Prediction, Detection And Reduction In Virtual Reality
Secure Infrastructure for Internet Of Medical Things Using Machine Learning
Feasibility Analysis of Access Control Policy Mining
Reducing False Negatives In Taint Analysis Via Hybrid Source Inference
When and How to Protect? Modeling Repeated Interactions with Computing Services under Uncertainty”
A FRAMEWORK FOR QUANTIFYING SECURITY EFFECTIVENESS OF CYBER ATTACKS AND DEFENSES
ROBUST AND INTERPRETABLE MACHINE LEARNING FOR CANCER OUTCOME PREDICTION
Role Based Access Control for Software Defined Networking: Formal Models and Implementation
Machine Learning Approaches to Improve Security and Performance Monitoring of IoT Devices
Code Element Vector Representations Through the Application of Natural Language Processing Techniques for Automation of Software Privacy Analysis
Aquatic Virtual Reality: Feasibility to Application
The Usability Of Interaction Methods in Augmented Reality
Tackling Build Failures in Continuous Integration
Understanding User Interface for Intelligent Software Analysis and Exploration
Enhance Security in Cloud Computing Through Virtual Machine Placement
Cybersickness in Persons with Multiple Sclerosis
Containerizing Database Queries
Securing Software Defined Network Infrastructure in Cloud Data Centers
A Framework for Characterizing Cyber Attack Reconnaissance Behaviors
Virtual Reality Disability Simulation: A Tool to Reduce Implicit Bias Towards Persons with Disabilities and a Motivation to Create Simulation
Improving Software Reliability Via Record and Replay
Detecting and Preventing Common Memory Vulnerabilities in Production Software