Abstract. Intrusion detection has been extensively studied in the last two decades. However, most existing intrusion detection techniques detect limited number of attack types and ...
Abstract. A compressed full-text self-index for a text T is a data structure requiring reduced space and able of searching for patterns P in T. Furthermore, the structure can repro...
In this paper, we present hthreads, a unifying programming model for specifying application threads running within a hybrid CPU/FPGA system. Threads are specified from a single p...
Erik Anderson, Jason Agron, Wesley Peck, Jim Steve...
Constructing indoor radio maps plays an important role in many services and applications such as wireless base station planning. In this paper, we propose a hybrid approach to con...
Zhe Xiang, Hangjin Zhang, Jian Huang, Song Song, K...
Abstract. Ontologies play a relevant role to support service matchmaking in the discovery process. In fact, the elements used for service capability description refer to concepts t...
Devis Bianchini, Valeria De Antonellis, Michele Me...