Detecting and mitigating insider threat is a critical element in the overall information protection strategy. By successfully implementing tactics to detect this threat, organizat...
Yali Liu, Cherita L. Corbett, Ken Chiang, Rennie A...
This paper describes the DiKe model-based diagnosis framework, which incorporates multiple diagnosis engines, multiple user-level system description languages, a theorem prover, an...
Gerhard Fleischanderl, Thomas Havelka, Herwig Schr...
Although image understanding and natural language processing constitute two major areas of AI, they have mostly been studied independentlyof each other. Only a few attempts have b...
According to Szyperski, “a software component is a unit of composition with contractually specified interfaces and explicit context dependencies only”. But it is well known tha...
Abstract. The emergence of computing environments where smart devices are embedded pervasively in the physical world has made possible many interesting applications and has trigger...