: Frequently, Security Monitoring is equated with network intrusion detection. However, Security Monitoring has a much broader scope. It also comprises detection of insider attacks...
Frederic Majer, Martin Nussbaumer, Dieter Riexinge...
We present a new model for the extraction of networks from images in the presence of occlusions. Such occlusions cause gaps in the extracted network that need to be closed. Using ...
Abstract. We describe and empirically evaluate machine learning methods for the prediction of zinc binding sites from protein sequences. We start by observing that a data set consi...
Sauro Menchetti, Andrea Passerini, Paolo Frasconi,...
— Graphical User Interface (GUI) APplications (GAPs) are ubiquitous and provide various services. However, it is difficult to make GAPs exchange information (i.e., interoperate)...
Mark Grechanik, Kevin M. Conroy, Kishore S. Swamin...
— Integrated systems are composed of components that exchange information (i.e., interoperate [5]). These components include Graphical User Interface (GUI) APplications (GAPs) an...