Previous works in the area of network security have emphasized the creation of Intrusion Detection Systems (IDSs) to flag malicious network traffic and computer usage. Raw IDS data...
S. J. Yang, S. Byers, J. Holsopple, B. Argauer, D....
Mobile information appliances are increasingly used in numerous different situations and locations, setting new requirements to their interaction methods. When the user's situ...
Albrecht Schmidt, Kofi Asante Aidoo, Antti Takaluo...
We present a smart kitchen that can enhance the traditional meal preparation and cooking process by raising awareness of the nutrition facts in food ingredients that go into a mea...
Abstract. Mobile devices are increasingly aware of their respective locations and vicinity and tend to communicate rather loosely with each other; therefore asynchronous communicat...
Christian P. Kunze, Sonja Zaplata, Winfried Lamers...
A Dyck shift and a Motzkin shift are mathematical models for constraints on genetic sequences. In terms of the theory of symbolic dynamics, neither of the Dyck shift nor the Motzki...