Organizations have become increasingly dependent on computing systems to achieve their business goals. The performance of these systems in terms of response times and cost has a m...
M. Qin, R. Lee, Asham El Rayess, Vidar Vetland, Je...
Misuse Detection systems identify evidence of attacks by searching for patterns of known attacks (signatures). A main problem in this context is the modeling and specification of a...
A model has been developed to study the global complex dynamics of a series of blackouts in power transmission systems [1, 2]. This model has included a simple level of self-organ...
Benjamin A. Carreras, Vickie E. Lynch, Ian Dobson,...
Abstract. As the scale and scope of multi-agent systems grow, it becomes increasingly important to design and manage the manner in which the participants interact. The potential fo...
Open learner models (OLM) enable users to access their learner model to view information about their understanding. Opening the learner model to the learner may increase their perc...