Runtime monitoring allows programmers to validate, for instance, the proper use of application interfaces. Given a property specification, a runtime monitor tracks appropriate run...
The innovations and improvements in digital imaging sensors and scanners, computer modeling, haptic equipments and e-learning technology, as well as the availability of many powerf...
Image categorization could be treated as an effective solution to enable keyword-based image retrieval. In this paper, we propose a novel image categorization approach by learnin...
—Flash-crowd attacks are the most vicious form of distributed denial of service (DDoS). They flood the victim with service requests generated from numerous bots. Attack requests...
The main objective of this work is to exploit the relationship between the information findability problem and a subject-based organization of information. Identification of a sub...