Previously, we demonstrated that simple, low-cost measurement of an individual's mental health is possible using nonlinear analysis of pulse waves. Here we introduce a trial s...
Protecting data is not simply a case of encrypt and forget: even data with full cryptographic confidentiality and integrity protection can still be subject to information leakage. ...
Workload adaptation is a performance management process in which an autonomic database management system (DBMS) efficiently makes use of its resources by filtering or controlling ...
Baoning Niu, Patrick Martin, Wendy Powley, Randy H...
In this paper, we present research trends carried out in the Orpailleur team at loria, showing how knowledge discovery and knowledge processing may be combined. The knowledge disco...
Jean Lieber, Amedeo Napoli, Laszlo Szathmary, Yann...
- Network Intrusion Detection Systems (NIDS) capture large amounts of data that is difficult or impractical to report and analyze directly from the capture device. It is also commo...