In the Database-As-a-Service (DAS) model, clients store their database contents at servers belonging to potentially untrusted service providers. To maintain data confidentiality, ...
Since it is desirable for an intrusion detection system to be operated with the real time performance, it is not unusual for an intrusion detection engine to perform a "lazy ...
TURING Test technologies are promising ways to validate AI systems which may have no alternative way to indicate validity. Human experts (validators) are often too expensive to in...
Abstract: In this paper we examine the usefulness of optimisation methods for practical farm program decisions. We inspect three Brandenburg cash crop farms over the last five year...
Our objective is to obtain the level of usability of a software application over the different tasks for which it has been developed. Nowadays, usability is measured through diffe...