Intrusion detection systems are distributed applications that analyze the events in a networked system to identify malicious behavior. The analysis is performed using a number of ...
: The goal of this work is to present the software WebRatio 5, which is a good representative of a new generation of CASE tools for model-driven design of Web applications. WebRati...
Roberto Acerbis, Aldo Bongio, Marco Brambilla, Ste...
The phenomenal growth of video on the web and the increasing sparseness of meta information associated with it forces us to look for signals from the video content for search/info...
Ming Zhao 0003, Jay Yagnik, Hartwig Adam, David Ba...
Since their beginning in constraint programming, set solvers have been applied to a wide range of combinatorial search problems, such as bin-packing, set partitioning, circuit desi...
Game semantics is an unusual denotational semantics in that it captures the intensional (or algorithmic) and dynamical aspects of the computation. This makes it an ideal semantica...