In this poster, we will propose a framework for finding, recommending and inserting learning objects in a digital repository level, exploiting the user context that is captured fro...
Attacks against privileged applications can be detected by analyzing the stream of system calls issued during process execution. In the last few years, several approaches have been...
Darren Mutz, William K. Robertson, Giovanni Vigna,...
In many different applications on the Web, distributed agents would like to discover and access high quality information sources. This is a challenging problem since an agent does...
Abstract. Obtaining ground truth for hyperspectral data is an expensive task. In addition, a number of factors cause the spectral signatures of the same class to vary with location...
In many cases, normal uses of a system form patterns that will repeat. The most common patterns can be collected into a prediction model which will essentially predict that usage p...