Most intrusion detection systems apply the misuse detection approach. Misuse detection compares recorded audit data with predefined patterns denoted as signatures. A signature is ...
In this paper, we address the interconnect-driven floorplanning problem that integrates OPC-friendly bus assignment with floorplanning. Buses consist of a number of horizontal/v...
Hua Xiang, Liang Deng, Li-Da Huang, Martin D. F. W...
Dimensional reduction may be effective in order to compress data without loss of essential information. Also, it may be useful in order to smooth data and reduce random noise. The...
Currently national digital library of educational resources and services (DLE) for primary and secondary education is under implementation in Lithuania. The article aims to analyse...
Vicarious Learning is learning from watching others learn. We believe that this is a powerful model for computer-based learning. Learning episodes can be captured and replayed to ...