As computer network technology becomes increasingly complex, it becomes necessary to place greater requirements on the validity of developing standards and the resulting technology...
The use of mobile applications is increasing rapidly. Particularly, mobile applications for decision support systems, such as mobile datawarehouses, are very attractive. However, ...
Abstract. Network Intrusion Detection Systems (NIDS) monitor a network with the aim of discerning malicious from benign activity on that network. While a wide range of approaches h...
The use of peer to peer file sharing networks such as Gnutella is proliferating on the Internet, but its use is bandwidth consuming due to the broadcast nature of some peer to pee...
Abstract. One phylogeny-based approach to horizontal gene transfer (HGT) detection entails comparing the topology of a gene tree to that of the species tree, and using their differ...