Cloud computing environments impose new challenges on access control techniques due to multi-tenancy, the growing scale and dynamicity of hosts within the cloud infrastructure, an...
Lucian Popa 0002, Minlan Yu, Steven Y. Ko, Sylvia ...
This paper investigates the combination of discriminative adaptation techniques. The discriminative Maximum A-Posteriori (DMAP) adaptation and discriminative feature Maximum Likel...
Studying human activities has significant implication in human beneficial applications such as personal healthcare. This research has been facilitated by the development of sensor ...
Abstract Workflows are prevailing in scientific computation. Multicluster environments emerge and provide more resources, benefiting workflows but also challenging the traditional ...
Unwanted traffic injection which amplifies the traffic loading and exhausts network resources is counted as network security threat. Despite of the numerous protection systems, th...