Abstract. We have developed a software system that simulates chemotaxis-based cell aggregation in 2D. The model implemented within the system consists of such cell behaviors as che...
Manolya Eyiyurekli, Peter I. Lelkes, David E. Bree...
Detection of malicious software (malware) by the use of static signatures is often criticized for being overly simplistic. Available methods of obfuscating code (so-called metamor...
This paper presents a multi-agent system for the care of elderly people living at home on their own, with the aim to prolong their independence. The system is composed of seven gro...
Bostjan Kaluza, Violeta Mirchevska, Erik Dovgan, M...
Malicious code is an increasingly important problem that threatens the security of computer systems. The traditional line of defense against malware is composed of malware detecto...
Enterprise networks face a variety of threats including worms, viruses, and DDoS attacks. Development of effective defenses against these threats requires accurate inventories of n...
Yunjing Xu, Michael Bailey, Eric Vander Weele, Far...