Abstract—The World Wide Web offers easy sharing of information, but provides only few options for the protection of sensitive information and other sensitive resources. Tradition...
Sergej Zerr, Daniel Olmedilla, Juri Luca De Coi, W...
Abstract. Network Intrusion Detection Systems (NIDS) aim at preventing network attacks and unauthorised remote use of computers. More accurately, depending on the kind of attack it...
Abstract— Discrete power allocation strategies for amplifyand-forward cooperative networks are proposed based on selective relaying methods. The goal of power allocation is to ma...
The efficient management of complex objects has become an enabling technology for modern multimedia information systems as well as for many novel database applications. Unfortunat...
Hans-Peter Kriegel, Peter Kunath, Martin Pfeifle, ...
Many cells in the primary visual cortex respond differently when a stimulus is placed outside their classical receptive field (CRF) compared to the stimulus within the CRF alone,...