In this paper we demonstrate that it is possible in general to detect Windows-based malicious program behavior. Since S. Forrest et al. used the N-grams method to classify system ...
Xin Tang, Constantine N. Manikopoulos, Sotirios G....
In this paper we discuss cultural issues encountered while offering an Algorithms course from a US university at a Chinese university using Tutored Video Instruction (TVI). TVI is...
This paper proposes the applications of soft computing to deal with the constraints in conventional modelling techniques of the dynamic extrusion process. The proposed technique i...
Leong Ping Tan, Ahmad Lotfi, Eugene Lai, J. B. Hul...
Rogue is an architecture built on a real robot which provides algorithms for the integration of highlevel planning, low-level robotic execution, and learning. Rogue addresses succ...
Dynamic Power Management (DPM) is a design methodology aiming at reducing power consumption of electronic systems by performing selective shutdown of idle system resources. The eff...