The goal of the work in this paper is towards the incorporation of context in recommender systems in the domain of mobile applications. The approach recommends mobile applications...
Most of the current Intrusion Detection Systems (IDS) examine all data features to detect intrusion or misuse patterns. Some of the features may be redundant or contribute little (...
Srilatha Chebrolu, Ajith Abraham, Johnson P. Thoma...
This paper examines WiInf-Central, the `virtual homeplace' of a student community (on Information Systems) at the University of Hamburg, and focuses on processes of social ide...
Markus Rohde, Leonard Reinecke, Bernd Pape, Moniqu...
We consider a class of hybrid dynamical systems and obtain conditions under which the behavior of these systems can be reduced to a finite state automaton. Specifically, we consi...
S. Di Gennaro, C. Horn, Sanjeev R. Kulkarni, Peter...
—This paper considers the problem of how to improve the performance of hybrid storage system employing solid state disks and hard disk drives. We utilize both initial block alloc...