We have been developing a data mining (i.e., knowledge discovery) framework, MADAM ID, for Mining Audit Data for Automated Models for Intrusion Detection [LSM98, LSM99b, LSM99a]. ...
—In this paper, we present an approach for symbol representation and recognition in line drawings, integrating both the vector-based structural description and pixel-level statis...
An executable computational logic can provide the desired bridge between formal system properties and formal methods to verify them on the one hand, and executable models of syste...
We advocate a network on silicon (NOS) as a hardware architecture to implement communication between IP cores in future technologies, and as a software model in the form of a prot...
Kees G. W. Goossens, Paul Wielage, Ad M. G. Peeter...
This paper describes a method for suppressing spatial conflicts in cartographic generalization of isobathymetric lines. These lines are modeled by parametric curves. For that purp...