Intrusions impose tremendous threats to today’s computer hosts. Intrusions using security breaches to achieve unauthorized access or misuse of critical information can have cata...
Chuan Feng, Jianfeng Peng, Haiyan Qiao, Jerzy W. R...
Information visualization is a powerful method for understanding and working with data. However, we still have an incomplete understanding of how people use visualization to think...
Abstract. In recent years, within the planning literature there has been a departure from approaches computing total plans for given goals, in favour of approaches computing partia...
Paolo Mancarella, Fariba Sadri, Giacomo Terreni, F...
Noun compound interpretation is the task of determining the semantic relations among the constituents of a noun compound. For example, "concrete floor" means a floor mad...
The random k-SAT model is extensively used to compare satisfiability algorithms or to find the best settings for the parameters of some algorithm. Conclusions are derived from the...