The paper discusses our research in development of general and systematic methods for intrusion prevention. The key idea is to use data mining techniques to discover repeated patt...
Recognizing useful modular robot configurations composed of hundreds of modules is a significant challenge. Matching a new modular robot configuration to a library of known configu...
Michael Park, Sachin Chitta, Alex Teichman, Mark Y...
Abstract. The use of Information and Communication Technology (ICT) in education is one important competence that student teacher should develop in their academic studies. To be ca...
In recent years, a large amount of work on chaos-based cryptosystems have been published. However many of the proposed schemes fail to explain or do not possess a number of featur...
Dense wavelength division multiplexing (DWDM) has become the dominant transport layer technology for next-generation backbone networks due to its unprecedented capacity scalabilit...
Qing Liu, Nasir Ghani, Nageswara S. V. Rao, Ashwin...