Uncorrupted log files are the critical system component for computer forensics in case of intrusion and for real time system monitoring and auditing. Protection from tampering wit...
This paper presents a novel approach to pedestrian classification which involves utilizing the synthesized virtual samples of a learned generative model to enhance the classificat...
Information agents are computational software systems that provides transparent access to many different information sources in the Internet, and to be able to retrieve, analyze, ...
Abstract— Meta-Learning has been used to predict the performance of learning algorithms based on descriptive features of the learning problems. Each training example in this cont...
Market players that can respond to critical business events faster than their competitors will end up as winners in the fast moving economy. Event-based systems have been develope...
Szabolcs Rozsnyai, Roland Vecera, Josef Schiefer, ...