Understanding the strategies of attacks is crucial for security applications such as computer and network forensics, intrusion response, and prevention of future attacks. This pap...
We consider the fundamental problem of authenticated group key exchange among n parties within a larger and insecure public network. A number of solutions to this problem have bee...
Abstract. As a consequence of the success of the Web, methodologies for information system development need to consider systems that use the Web paradigm. These Web Information Sys...
Geert-Jan Houben, Peter Barna, Flavius Frasincar, ...
The attribute selection techniques for supervised learning, used in the preprocessing phase to emphasize the most relevant attributes, allow making models of classification simple...
This paper suggests a discriminative approach for wavelet denoising
where a set of mapping functions (MF) are applied to the transform
coefficients in an attempt to produce a noi...