This paper aims to address the problem of anomaly detection and discrimination in complex behaviours, where anomalies are subtle and difficult to detect owing to the complex tempo...
Multiple data sources containing different types of features may be available for a given task. For instance, users’ profiles can be used to build recommendation systems. In a...
In a wireless communication network different users share a common resource. An objective of radio resource management is to assign the resources in an effective way between the us...
The planning and management of supply chains require properly specifying the participating members and the relationships among them. Construction supply chains usually consist of n...
Jack C. P. Cheng, Kincho H. Law, Hans Bjornsson, A...
Denial of Service (DoS) attacks are serious threats for network societies. For dealing with DoS attacks, Jakobsson and Juels first proposed the notion of useful client puzzles (UC...