We have implemented Multi-Session based Network Security Event Detector: ROOK to detect botnet activity and P2P file sharing traffic and our results show that our method is less...
Abstract— This paper presents a comparison of four bioinspired algorithms (all seen as search engines) with a similar constraint-handling mechanism (Deb’s feasibility rules) to...
This paper describes our efforts to investigate factors in user browsing behavior to automatically evaluate Web pages that the user shows interest in. We developed a client site l...
This paper presents a methodology for the real-time extraction of readers’ emotional state from documents as well as the representation of emotionally annotated documents into a...
This paper shows how moral decisions can be drawn computationally by using prospective logic programs. These are employed to model moral dilemmas, as they are able to prospectively...