Abstract. We consider cooperating intrusion detection agents that limit the cooperation information flow with a focus on privacy and confidentiality. Generalizing our previous work...
Abstract. Complex business processes are usually realized by specifying the integration and interaction of smaller modular software components. For example, hitherto monolithic ent...
Martin Wimmer, Martina-Cezara Albutiu, Alfons Kemp...
This paper describes the development of the generic collaboration support architecture CAKE incorporating case-based reasoning (CBR). CAKE provides unified access to knowledge avai...
Ethernet communication devices, such as adapter, hub, bridge and switch, all follow IEEE 802.3 standard protocol. We have designed and implemented an integrated 10/100 Mbps Etherne...
Anti-aliasing in form factor computation and precise determination of shadow boundaries are important issiresfor Radiosity method. A-Buffer is a technique introduced by Carpenter ...
Q. Wang, J. H. Tang, C. H. Lim, H. C. Teh, Z. Y. H...