Today’s signature-based intrusion detection systems are reactive in nature and storage-limited. Their operation depends upon catching an instance of an intrusion or virus and en...
Charles R. Haag, Gary B. Lamont, Paul D. Williams,...
A large class of problems requires real-time processing of complex temporal inputs in real-time. These are difficult tasks for state-of-the-art techniques, since they require captu...
Igal Raichelgauz, Karina Odinaev, Yehoshua Y. Zeev...
ERP implementation issues have been given much attention since two decades ago due to its low implementation success. Nearly 90 percent of ERP implementations are late or over bud...
Liang Zhang, Matthew K. O. Lee, Zhe Zhang, Probir ...
As user experience studies move from laboratories to mobile context, we need tools for collecting data in natural settings. Based on the results from a pilot study, we present ear...
This paper discusses techniques for visualizing structure in video data and other data sets that represent time snapshots of physical phenomena. Individual frames of a movie are t...