This paper explores the generation of candidates, which is an important step in frequent itemset mining algorithms, from a theoretical point of view. Important notions in our prob...
A powerful strategy in intrusion detection is the separation of surveillance mechanisms from a site’s policy for processing observed events. The Bro intrusion detection system h...
We present tensor scale descriptor (TSD)— a shape descriptor for content-based image retrieval, registration, and analysis. TSD exploits the notion of local structure thickness,...
Paulo A. V. Miranda, Ricardo da Silva Torres, Alex...
The aim of this paper is to introduce a modelling concept and structuring principle for rule-based systems the semantics of which is not restricted to a sequential behavior, but ca...
Within one model, behavioural consistency of its constituents is often problematic. Within UML such horizontal behavioural consistency between the objects of a concrete model, is p...
Luuk Groenewegen, Niels van Kampenhout, Erik P. de...