Current Intrusion Detection Systems (IDS) examine all data features to detect intrusion or misuse patterns. Some of the features may be redundant or contribute little (if anything)...
Abstract. A significant increase in real world event monitoring capability with wireless sensor networks brought a new challenge to ubiquitous computing. To manage high volume and...
Research in Privacy Enhancing Technologies has a tradition of about 25 years. The basic technologies and ideas were found until 1995 while the last decade was dominated by the util...
Abstract. Third party service providers are starting to use advanced location services based on area or periodical notification in order to develop innovative applications. Howeve...
Oliver Jorns, Oliver Jung, Julia Gross, Sandford B...
This paper explores hybrid agents that use a variety of techniques to improve their performance in an environment over time. We considered, specifically, geneticlearning-parentin...