There are standard risk analysis methodologies like GMITS and ISO17799, but new threats and vulnerabilities appear day by day because the IT organizations, its infrastructure, and ...
Yoon Jung Chung, In-Jung Kim, Namhoon Lee, Taek Le...
As research in context recognition moves towards more maturity and real life applications, appropriate and reliable performance metrics gain importance. This paper focuses on the ...
TheexactlikelihoodfunctionofaGaussianvectorautoregressive-movingaverage(VARMA)model is evaluated in two nonstandard cases: (a) a parsimonious structured form, such as obtained in ...
This paper presents a methodology for knowledge acquisition from source code. We use data mining to support semiautomated software maintenance and comprehension and provide practi...
This paper evaluates the performance of edge-based directional probability distributions as features in writer identification in comparison to a number of non-angular features. It...