Abstract. Most intrusion detection systems deployed today apply misuse detection as detection procedure. Misuse detection compares the recorded audit data with predefined patterns,...
A major problem in the development of distributed applications is that we cannot assume that the environment in which the application is to operate will remain the same. This mean...
Maarten van Steen, Stefan Van der Zijden, Henk J. ...
Developing a large belief network, like any large system, requires systems engineering to manage the design and construction process. We propose that network engineering follow a ...
Ambient intelligent applications require applications to recognise user activity calmly in the background, typically by instrumentation of environments. In contrast, we propose the...
Martin Strohbach, Gerd Kortuem, Hans-Werner Geller...
Abstract. The prototype of a content based search engine for mathematical knowledge supporting a small set of queries requiring matching and/or typing operations is described. The ...
Andrea Asperti, Ferruccio Guidi, Claudio Sacerdoti...