Abstract. Many systems have been introduced to detect software intrusions by comparing the outputs and behavior of diverse replicas when they are processing the same, potentially m...
This paper proposes a methodology to generate artificial data sets to evaluate the behavior of machine learning techniques. The methodology relies in the definition of a domain an...
Joaquin Rios-Boutin, Albert Orriols-Puig, Josep Ma...
We analyze the asymptotic behavior of agents engaged in an infinite horizon partially observable stochastic game as formalized by the interactive POMDP framework. We show that whe...
—This paper presents an Erlang reduced load model to analyze Optical Burst Switched Grid networks. The model allows the evaluation of job blocking probabilities, in which blockin...
Marc De Leenheer, Chris Develder, Filip De Turck, ...
Workflow management systems integrate applications and data resources in business processes. Frequently they have to keep local copies of data in the so called workflow repositor...