Intrusion detection is an essential component of computer security mechanisms. It requires accurate and efficient analysis of a large amount of system and network audit data. It c...
—Defect tracking using computational intelligence methods is used to predict software readiness in this study. By comparing predicted number of faults and number of faults discov...
This article describes the method of Mobile Process Landscaping by example of a project in which the service processes of a company from the housing industry were analyzed regardin...
This work aims to investigate the suitability of applying Virtual Reality techniques in the exploration of Mars terrain features in order to support the creation of topographic ma...
—Today verification, testing and debugging of SystemC models can be applied at an early stage in the design process. To support these techniques gaining required information of ...