Frequently, the number of input variables (features) involved in a problem becomes too large to be easily handled by conventional machine-learning models. This paper introduces a c...
Fernando Mateo, Dusan Sovilj, Rafael Gadea Giron&e...
This paper summarizes value analysis of adopting technologysupported attendance control service in a primary school. The results are based on a case study that explored a 14-week ...
Minna Isomursu, Mari Ervasti, Marianne Kinnula, Pe...
A collaborative system must perform both processing and transmission tasks. We present a policy for scheduling these tasks on a single core that is inspired by studies of human pe...
Computer security systems protect computers and networks from unauthorized use by external agents and insiders. The similarities between computer security and the problem of prote...
Stephanie Forrest, Steven A. Hofmeyr, Anil Somayaj...
This paper describes a secure and reliable method for storing data in a distributed hash table (DHT) leveraging the inherent properties of the DHT to provide a secure storage subs...