A variety of network security services, such as access control in firewalls and protocol analysis in intrusion detection systems, require the discrimination of packets based on th...
In this paper, we aim to design decision-making mechanisms for a simulated Khepera robot equipped with simple sensors, which integrates over time its perceptual experience in order...
Previous information extraction (IE) systems are typically organized as a pipeline architecture of separated stages which make independent local decisions. When the data grows bey...
Qi Li, Sam Anzaroot, Wen-Pin Lin, Xiang Li, Heng J...
Background: Currently there is a strong need for methods that help to obtain an accurate description of protein interfaces in order to be able to understand the principles that go...
Joan Teyra, Andreas Doms, Michael Schroeder, M. Te...
Load balancing is a critical issue for the efficient operation of peerto-peer networks. We give two new load-balancing protocols whose provable performance guarantees are within a...