A reasonable definition of intrusion is: entering a community to which one does not belong. This suggests that in a network, intrusion attempts may be detected by looking for com...
Qi Ding, Natallia Katenka, Paul Barford, Eric D. K...
— In this paper we propose a new technique allowing to map descriptive data into relative distance space, which is based primarily on senses of the terms stored in our data. We u...
M. Shahriar Hossain, Monika Akbar, Rafal A. Angryk
The interest is in characterizing insightfully the power of program self-reference in effective programming systems (epses), the computability-theoretic analogs of programming lan...
Two-dimensional constrained Delaunay triangulations are geometric structures that are popular for interpolation and mesh generation because they respect the shapes of planar domai...
Abstract. The present study used 3D data on neuronal morphology images to quantitatively characterize the phenotype of transgenic neurons. We calculated the multiscale fractal dime...
Andreas Schierwagen, Luciano da Fontoura Costa, Al...