This paper aims at proposing a methodology for evaluating current IDS capabilities of detecting attacks targeting the networks and their services. This methodology tries to be as r...
A fully automated system for the identification of possible oil spills present on Synthetic Aperture Radar (SAR) satellite images based on artificial intelligence fuzzy logic has ...
1 The arrival of any piece of unsolicited and unwanted email (spam) into a user's email inbox is a problem. It results in real costs to organisations and possibly an increasin...
Duncan Cook, Jacky Hartnett, Kevin Manderson, Joel...
Systems such as adaptative and context–aware ones must adapt themselves to changing requirements at runtime. Modeling and implementing this kind of systems is a difficult opera...
A Reconfigurable Consistency Algorithm (RCA) is an algorithm that guarantees the consistency in Distributed Shared Memory (DSM) Systems. In a RCA, there is a Configuration Control...