Context detection for mobile users plays a major role for enabling novel, human-centric interfaces. For this, we introduce a context detection scheme for disseminated, computer em...
— In this paper we provide experimental results and extensions to our previous theoretical findings concerning the combination of forecasts that have been diversified by three ...
Anomaly detectors have become a necessary component of the computer and information security framework. Some of the numerous drawbacks experienced by the current Anomaly detectors...
This paper presents a parallel algorithm for recursive query processing and shows how it can be efficiently implemented in a local computer network. The algorithm relies on an int...
We all use our associative memory constantly. Words and concepts form paths that we can follow to find new related concepts; for example, when we think about a car we may associate...