Many embedded systems are designed to take timely reactions to the occurrences of interested scenarios. Sometimes transient overloads might be experienced due to hardware malfunct...
This research employs unsupervised pattern recognition to approach the thorny issue of detecting anomalous network behavior. It applies a connectionist model to identify user behav...
Abstract The JAMUS platform is dedicated to providing a safe runtime environment for untrusted Java application programs, while offering each of these programs access to the resour...
—In this paper a method for the objective assessment of burn scars is proposed. The quantitative measures developed in this research provide an objective way to calculate elastic...
Leonid V. Tsap, Dmitry B. Goldgof, Sudeep Sarkar, ...
- Today there is a real challenge in accessing relevant information according to the needs and the context of the user. Recent studies have dynamically enhanced the user query with...