The process of monitoring the events occurring in a computer system or network and analyzing them for sign of intrusions is known as intrusion detection system (IDS). This paper p...
This paper presents work in progress to explore the possibility of combining model-driven and domain modeling techniques to facilitate support for reuse and automation. The approa...
This paper presents an approach for representing, and providing computer support for, the configuration of interactive systems, particularly ubiquitous systems, that offers a flexi...
We combine techniques originally developed for refutational first-order theorem proving within the clause tree framework with techniques for minimal model computation developed wi...
Peter Baumgartner, Joseph Douglas Horton, Bruce Sp...
Abstract The problem of portfolio risk estimation in volatile markets requires employing fat-tailed models for financial instrument returns combined with copula functions to captur...
Stoyan V. Stoyanov, Borjana Racheva-Iotova, Svetlo...