— The ad-hoc methodology that is prevalent in today’s testing and evaluation of network intrusion detection algorithms and systems makes it difficult to compare different algor...
Nicholas Athanasiades, Randal Abler, John G. Levin...
Warnings have been raised about the steady diminution of privacy. More and more personal information, such as that contained electronic mail, is moving to cloud computing servers ...
Free/Open Source Software (F/OSS) repositories contain valuable data and their usefulness in studying software development and community activities continues to attract a lot of re...
Sulayman K. Sowe, Lefteris Angelis, Ioannis Stamel...
In this paper, a novel feature named Adaptive Contour
Feature (ACF) is proposed for human detection and segmentation.
This feature consists of a chain of a number of
granules in...
Wei Gao (Tsinghua University), Haizhou Ai (Tsinghu...
Abstract. In this paper, we present a major improvement in the search procedures in constraint programming. First, we integrate various search procedures from AI and OR. Second, we...