With the growing deployment of host and network intrusion detection systems, managing reports from these systems becomes critically important. We present a probabilistic approach t...
In this paper, we consider a vision-based system that can interpret a user's gestures in real time to manipulate windows and objects within a graphical user interface. A hand...
be regarded as an abstraction of the underlying effective network connectivity, i.e. its functional connectivity. Although similar functional connectivity models have been describe...
— In this paper we provide experimental results and extensions to our previous theoretical findings concerning the combination of forecasts that have been diversified by three ...
In this paper we propose a comparative study of Artificial Neural Networks (ANN) and Artificial Immune Systems. Artificial Immune Systems (AIS) represent a novel paradigm in the fi...
Vitoantonio Bevilacqua, Cosimo G. de Musso, Filipp...