Distributed Denial of Service (DDoS) attacks have become a large problem for users of computer systems connected to the Internet. DDoS attackers hijack secondary victim systems us...
The contributions to this special issue on cognitive development collectively propose ways in which learning involves developing constraints that shape subsequent learning. A lear...
Embedded systems are constrained by the available memory. Code-compression techniques address this issue by reducing the code size of application programs. It is a major challenge ...
Abstract. Due to new emerging areas in the communication field there is a constant need for the design of novel communication protocols. This demands techniques for a rapid and eff...
Abstract. Various techniques for learning meronymy relationships from opendomain corpora exist. However, extracting meronymy relationships from domain-specific, textual corporate d...
Ashwin Ittoo, Gosse Bouma, Laura Maruster, Hans Wo...