Software is an increasing and important part of many products and systems. Software, hardware, and system level components have been developed and produced following separate proc...
Abstract. In practice, most computer intrusions begin by misusing programs in clever ways to obtain unauthorized higher levels of privilege. One e ective way to detect intrusive ac...
Anup K. Ghosh, Christoph C. Michael, Michael Schat...
We are concerned by schema evolution in Object Oriented Databases (OODB) that is processed by a modification on the classes on the schema. We present a new categorization of the d...
Textual-case based reasoning (TCBR) systems where the problem and solution are in free text form are hard to evaluate. In the absence of class information, domain experts are neede...
M. A. Raghunandan, Nirmalie Wiratunga, Sutanu Chak...
We are in the process of creating a multi-representational and multi-layered treebank for Hindi/Urdu (Palmer et al., 2009), which has three main layers: dependency structure, pred...