Previous methods of network anomaly detection have focused on defining a temporal model of what is "normal," and flagging the "abnormal" activity that does not...
Kevin M. Carter, Richard Lippmann, Stephen W. Boye...
Short Messaging Service (SMS) is popularly used to provide information access to people on the move. This has resulted in the growth of SMS based Question Answering (QA) services....
Govind Kothari, Sumit Negi, Tanveer A. Faruquie, V...
This paper presents a new algorithm for object handling tasks based on active tactile and slippage sensations using a humanoid robot multi-fingered arm for an object that exists at...
Commitment-based interaction protocols are a flexible way of representing the interaction of a set of agents, that are well-known and widely accepted by the research community. Nor...
A complex modern manufacturing process is normally under consistent surveillance via the monitoring of signals/variables collected from sensors. However, not all of these signals ...
Michael McCann, Yuhua Li, Liam P. Maguire, Adrian ...