We apply advanced agent trust modeling techniques to identify malicious traffic in computer networks. Our work integrates four state-of-the-art techniques from anomaly detection,...
— Active contours have been widely used as image segmentation methods. The use of level set theory has provided more flexibility and convenience for the implementation of active...
Advances in fabrication techniques are now enabling new hybrid CPU/FPGA computing resources to be integrated onto a single chip. While these new hybrids promise significant perfor...
It can be argued that although computer science may seem one of the best researched areas, it could also be one of the worst taught. In this research we examine the residual probl...
The problem of detecting "atypical objects" or "outliers" is one of the classical topics in (robust) statistics. Recently, it has been proposed to address this...