Logcrypt provides strong cryptographic assurances that data stored by a logging facility before a system compromise cannot be modified after the compromise without detection. We b...
In this paper, three approaches are presented for generating and validating sequences of different size neural nets. First, a growing method is given along with several weight ini...
Pramod Lakshmi Narasimha, Walter Delashmit, Michae...
preferred abstracting and indexing databases to full text. Librarians and information professionals want the choice to be able to purchase subject orientated packages of electronic...
Although different strands of “post-approaches” and “post-theories”, for example, grounded theory and structuration theory, have gained popularity in Information Systems (...