This paper presents the Intrusion Detection toolkit (IDtk), an information Visualization tool for intrusion detection (ID). IDtk was developed through a user-centered design proce...
This paper suggests a novel image compression scheme, using the discrete wavelet transformation (DWT) and the fuzzy c-means clustering technique. The goal is to achieve higher com...
Dimitris A. Karras, S. A. Karkanis, Dimitrios E. M...
Abstract. We describe the key features of the proof description language of Declare, an experimental theorem prover for higher order logic. We take a somewhat radical approach to p...
Consider a scientist who wants to explore multiple data sets to select the relevant ones for further analysis. Since the visualization real estate may put a stringent constraint o...
A given business process may face a large number of regulatory obligations the process may or comply with. Providing tools and techniques through which an evaluation of the complia...