In recent years research activities in computer network security focus more actively on the development of effective methods in intrusion detection. The reason for this developmen...
The use of dynamic access control policies for threat response adapts local response decisions to high level system constraints. However, security policies are often carefully tigh...
We present the machine learning framework that we are developing, in order to support explorative search for non-trivial linguistic configurations in low-density languages (langua...
This paper explores a novel way to incorporate hardware-programmable resources into a processor microarchitecture to improve the performance of general-purpose applications. Throu...
This paper deals with various kinds of mental representations available for linguistic instruction in spatial humanrobot interaction. After a survey of the literature on spatial r...