Final year, group (capstone) projects in computing disciplines are often expected to fill multiple roles: in addition to allowing students to learn important domain-specific knowl...
We present and empirically analyze a machine-learning approach for detecting intrusions on individual computers. Our Winnowbased algorithm continually monitors user and system beh...
In this work, we propose a hierarchical latent dictionary approach to estimate the timevarying mean and covariance of a process for which we have only limited noisy samples. We fu...
Alona Fyshe, Emily B. Fox, David B. Dunson, Tom M....
Abstract. Recent research has suggested that there is no general similarity measure, which can be applied on arbitrary databases without any parameterization. Hence, the optimal co...
Many of the approaches that analyze software evolution consider a static perspective of a system. Static analysis approaches focus on the evolution of static software entities suc...