The security of your data and of your network is in the hands of intrusion detection systems, virus scanners and spam filters, which are all critically based on string matching. ...
Daniele Paolo Scarpazza, Oreste Villa, Fabrizio Pe...
We present a novel visual correlation paradigm for situational awareness (SA) and suggest its usage in a diverse set of applications that require a high level of SA. Our approach ...
Yarden Livnat, James Agutter, Shaun Moon, Stefano ...
The purpose of this research is to develop effective machine learning or data mining techniques based on flexible neural tree FNT. Based on the pre-defined instruction/operator se...
— An opportunistic radio is a radio able to detect the spectrum unused bands, and to adapt its transmission parameters in order to transmit within these free bands. An opportunis...
Abdelaziz Bouzegzi, Pierre Jallon, Philippe Ciblat
Previous research exploring interpersonal-technologymediated interruptions has focused on understanding how the knowledge of an individuals local context can be utilized to redu...