Intrusion detection systems (IDSs) must maximize the realization of security goals while minimizing costs. In this paper, we study the problem of building cost-sensitive intrusion...
Wenke Lee, Wei Fan, Matthew Miller, Salvatore J. S...
—To address energy constraint problem in sensor networks, node reclamation and replacement strategy has been proposed for networks accessible to human beings and robots. The majo...
Abstract—The pervasive computing vision consists in realizing ubiquitous technologies to support the execution of people’s everyday tasks by proactively providing appropriate i...
Abstract--Pocket Data Mining PDM is our new term describing collaborative mining of streaming data in mobile and distributed computing environments. With sheer amounts of data stre...
Frederic T. Stahl, Mohamed Medhat Gaber, Max Brame...
E-Government reflects current visions for public administrations towards modernization and reorganization. Thereof, online one-stop Government targets the improvement of customer-...