Most current anomaly Intrusion Detection Systems (IDSs) detect computer network behavior as normal or abnormal but cannot identify the type of attacks. Moreover, most current intr...
Situational Method Engineering for constructing ad-hoc agent oriented design process is grounded on a well defined set of phases that are principally based on reuse of components c...
This paper presents an approach to estimating the parameters of continuous density HMMs for visual speech recognition. One of the key issues of image-based visual speech recogniti...
Contours and surfaces are basic qualities which are processed by the visual system to aid the successful behavior of autonomous beings within the environment. There is increasing e...
Data mining methods are successful in educational environments to discover new knowledge or learner skills or features. Unfortunately, they have not been used in depth with collabo...