There is often the need to update an installed Intrusion Detection System (IDS) due to new attack methods or upgraded computing environments. Since many current IDSs are construct...
We present a method for producing real-time volume visualizations of continuously captured, arbitrarily-oriented 2D arrays (slices) of data. Our system constructs a 3D representat...
William F. Garrett, Henry Fuchs, Mary C. Whitton, ...
The article presents a general model of the emergence of social order in multi-agent-systems (MAS). The agents consist of two types of neural networks that have the task to generat...
This paper proposes an unsupervised learning model for classifying named entities. This model uses a training set, built automatically by means of a small-scale named entity dicti...
Abstract. In this paper we present the BPAL platform that includes a logicbased language for business process (BP) modeling and a reasoning mechanism providing support for several ...
Antonio De Nicola, Michele Missikoff, Maurizio Pro...