Stories
- Can a programming language use values annotated with metadata that are stored in databases?
Article
- Wheelchair-Mounted Sensors Detect Accessibility Barriers in Real-Time
Article
- Modelling, Characterising & Scheduling Services in Kubernetes
Article
- A Plug-in Critiquing Approach for Knowledge Graph Recommendation Systems via Representative Sampling
Article
- Modeling How False Information Spreads and Sticks in Social Networks
Article
- When and Where to Deploy Fact-Checkers: A Model for Reducing Disinformation Spread
Article
- Scrapers Selectively Respect robots.txt Directives: Evidence From a Large-Scale Empirical Study
Article
- Programming Learning Difficulties Before and After ChatGPT: A Rare Comparison
Article
- How City Portals in China and Western Countries differ?
Article
- Learnable Orthogonal Decomposition for Non-Regressive Prediction for PDE
Article
- Measuring South Africa’s Internet in the Dark: What Blackouts Do to Its Internet Infrastructure
Article
- MMM-fair: An Interactive Toolkit for Exploring and Operationalizing Multi-Fairness Trade-offs
Article
- Similarities, differences, and relationships of comparable self-x system classes
Article
- Moneywork: bridging fragmented digital payments
Article
- AI That Learns From Your Habits to Improve Your Health Without Exposing Your Data
Article
- SCALE-CCL: A Scalable Collective Communication Library for Wide-Area Distributed Training
Article
- Simplifying Network Analysis in ns-3 with a Linux-style Socket Statistics Tool
Article
- Multi-robot communication isolation with ROS2
Article
- Low HP: Evaluating the Accuracy of Medicine in Video Games
Article
- Survey of Action Recognition, Spotting and Spatio-Temporal Localization in Soccer
Article
- Realizing Corrupted-Shard Tolerance: A Sharding Blockchain with Preserving Global Resilience
Article
- A Decade-long Analysis of Global Trends in Advanced Persistent Threats
Article
- Action is All You Need: Dual-Flow Generative Ranking Network for Recommendation
Article
- Emergency Recovery of Data Stored Privately on the Cloud
Article
- Are Cryptocurrencies Becoming More Decentralized? A 15-Year Study of 7 Major Ecosystems.
Article
- How humans and AI notice what is missing in images and stories
Article
- A Practical System for Understanding and Monitoring Computer Vision AI Models
Article
- AI-Powered Disassembly for Understanding Compiled Software
Article
- BLACKOUT: Making software both memory-safe and free from side-channel leaks
Article
- Hiding in Plain Sight: Disrupting Malware’s Secret Web Dead Drops
Article
- A Marine Wildlife Video Dataset
Article
- WinSpy: Cross-window Side-channel Attacks on Android's Multi-window Mode
Article
- Audio deepfake detection with visual artifacts
Article
- Clearer Ultrasound Scans: Removing Noise Without Human Help
Article
- Creating Realistic Medical Images Without the Need for Human Labels
Article
- Measuring the deployment of DNSSEC Bootstrapping Using Authenticated Signals
Article
- LLM-based Community Search via Dual-agent Collaboration
Article
- Hidden risks: Fake data can manipulate rankings in local privacy systems
Article
- Protecting Smart Voice Assistants from Invisible and Malicious Audio Attacks
Article
- Demo: Split-and-Pipeline: Collaborative Large Model Inference on Edge Devices
Article
- AI Links the Cause of Stroke to the Damage Seen on Brain Scans
Article
- Using AI to Detect Cyberattacks in Cloud Software Pipelines
Article
- Technology and the Future of Tibetan Cultural Preservation
Article
- Story of my career
Article
- Virtual Reality Banking
Article
- A Scalable Hybrid Approach Using Generative AI for Recommendations.
Article
- Matching Street Photos to Satellite Images Using AI Reasoning
Article
- A Clear Overview of Chaos Engineering and How It Strengthens Software Resilience
Article