— Meetings are a very important part of everyday life for professionals working in universities, companies or governmental institutions. We have designed a physical awareness sys...
Abstract. We present an overview of anomaly detection used in computer security, and provide a detailed example of a host-based Intrusion Detection System that monitors file syste...
Salvatore J. Stolfo, Shlomo Hershkop, Linh H. Bui,...
This paper describes a case study of VR platform Magic Mirror and its applications that are economic in development process and cost, flexible by contents and installation conditi...
Much experience has been gained with the protocols and mechanisms needed for discovery and allocation of remote computational resources. However, the preparation of a remote compu...
Most of supervised learning algorithms assume the stability of the target concept over time. Nevertheless in many real-user modeling systems, where the data is collected over an ex...