Abstract— This paper presents a summary of university research performed on honeypot techniques and summarizes the results Honeypots are computing resources that serve no other p...
A hitherto unquestioned assumption made by all methods for integrity checking has been that the database satisfies its constraints before each update. This consistency assumption ...
KNOPPIX is a bootable CD with a collection of GNU/Linux software. KNOPPIX is very convenient but it requires downloading 700MB iso image and burning a CD-ROM when it is renewed. I...
This paper argues that proactive behaviour, caused by high engagement and motivation of the learners, may lead to failure of collaborative learning. By examining empirical data fr...
The fitness function of an evolutionary algorithm is one of the few possible spots where application knowledge can be made available to the algorithm. But the representation and u...