Intrusion detection is a key technology for self-healing systems designed to prevent or manage damage caused by security threats. Protecting web server-based applications using in...
Kenneth L. Ingham, Anil Somayaji, John Burge, Step...
The process of understanding a source code in a high-level programming language involves complex computation. Given a piece of legacy code and a library of program plan templates, ...
To enable the resource discovery of audiovisual documents over the World Wide Web, it will be necessary to define content description standards or metadata standards for complex, ...
In this paper a novel method called Extended TwoDimensional PCA (E2DPCA) is proposed which is an extension to the original 2DPCA. We state that the covariance matrix of 2DPCA is e...
Mehran Safayani, Mohammad Taghi Manzuri Shalmani, ...
In this contribution, we explore the possibilities of learning in large-scale, multimodal processing systems operating under real-world conditions. Using an instance of a large-sca...