The immaturity of current intrusion detection techniques limits the traditional security systems in surviving malicious attacks. Intrusion tolerance approaches have emerged to over...
Scoring sentences in documents given abstract summaries created by humans is important in extractive multi-document summarization. In this paper, we formulate extractive summariza...
Abstract. Nowadays, information systems have to perform in complex, heterogeneous environments, considering a variety of system users with different needs and preferences. Software...
Mirko Morandini, Loris Penserini, Anna Perini, Ang...
Initially designed for WLAN's, IEEE 802.11 medium access control (MAC) has also been widely used in the research of multihop wireless networks. The core MAC technique of IEEE ...
The inclusion of document length factors has been a major topic in the development of retrieval models. We believe that current models can be further improved by more refined est...