Machine learning techniques are widely used in many fields. One of the applications of machine learning in the field of the information security is classification of a computer be...
A large number of methods for circle detection has been studied in the last years for numerous image processing applications. The application domain considered in this paper is th...
—The distributed nature of the CSMA/CA based wireless protocols, e.g., the IEEE 802.11 distributed coordinated function (DCF), allows malicious nodes to deliberately manipulate t...
In this paper we describe a rule-based approach to semantic specification that can be used to establish semantic agreement between a source and receiver. Query processing techniqu...
Abstract—Higher organisms are able to respond to continuously changing external conditions by transducing cellular signals into specific regulatory programs, which control gene ...