The network and distributed systems research communities have an increasing need for “replayable” research, but our current experimentation resources fall short of reaching th...
Anomaly Detection (AD) sensors compute behavior profiles to recognize malicious or anomalous activities. The behavior of a host is checked continuously by the AD sensor and an ale...
Fuzzy constraints are a popular approach to handle preferences and over-constrained problems in scenarios where one needs to be cautious, such as in medical or space applications. ...
Mirco Gelain, Maria Silvia Pini, Francesca Rossi, ...
An experimental study of the feasibility and accuracy of the acyclicity approach introduced in [14] for the inference of business relationships among autonomous systems (ASes) is ...
: A novel, non-touch, screen pointing "magic wand" interface is proposed for surgeon's use in an environment requiring simultaneous display of several patients'...