Abstract. Anomaly detection is based on profiles that represent normal behaviour of users, hosts or networks and detects attacks as significant deviations from these profiles. In t...
This research examines the application of the tasktechnology fit (TTF) model to World Wide Web (WWW) usage for electronic commerce (EC) purposes. Conducted from corporate buyersâ€...
Younes Benslimane, Michel Plaisent, Prosper Bernar...
One advantage of evolutionary multiobjective optimization (EMO) algorithms over classical approaches is that many non-dominated solutions can be simultaneously obtained by their si...
This paper reports on the construction and testing of a new Question Answering (QA) system, implemented as an workflow which builds on several web services developed at the Resear...
Radu Ion, Dan Stefanescu, Alexandru Ceausu, Dan Tu...
Using automated reasoning techniques, we tackle the niche activity of proving that a program is free from run-time exceptions. Such a property is particularly valuable in high inte...
Andrew Ireland, Bill J. Ellis, Andrew Cook, Roderi...