The paper discusses our research in development of general and systematic methods for intrusion prevention. The key idea is to use data mining techniques to discover repeated patt...
As a software system evolves to accommodate new features and repair bugs, changes are needed. Software components are interdependent, changes made to one component can require cha...
The Network Time Protocol (NTP) is widely used to synchronize computer clocks throughout the Internet. Existing NTP clients and servers form a very large distributed system, and y...
Abstract. Scheduling staff shift work in a hospital ward is a well-known problem in the operation research field but, as such, it is very often studied from the algorithmic point o...
Carmelo Ardito, Paolo Buono, Maria Francesca Costa...
The complexity of the kinematic and dynamic structure of humanoid robots make conventional analytical approaches to control increasingly unsuitable for such systems. Learning techn...