The paper presents a general framework for concurrent navigation and exploration of unknown environments based on discrete potential fields that guide the robot motion. These poten...
Attackers often try to evade an intrusion detection system (IDS) when launching their attacks. There have been several published studies in evasion attacks, some with available to...
This paper describes our experience with applying data mining techniques to the problem of fraud detection in spatio-temporal health data in Medicare Australia. A modular framework...
Kee Siong Ng, Yin Shan, D. Wayne Murray, Alison Su...
Conservative adaptation consists in a minimal change on a source case to be consistent with the target case, given the domain knowledge. It has been formalised in a previous work t...
The paper presents a topology-based visualization method for time-dependent two-dimensional vector elds. A time interpolation enables the accurate tracking of critical points and ...
Xavier Tricoche, Thomas Wischgoll, Gerik Scheuerma...