Abstract. We present a method that improves the results of network intrusion detection by integration of several anomaly detection algorithms through trust and reputation models. O...
The use of information technologies (IT) to collect personal health information is growing in popularity via computer-assisted interviewing and a wide variety of healthcare Web si...
Large networks of spiking neurons show abrupt changes in their collective dynamics resembling phase transitions studied in statistical physics. An example of this phenomenon is th...
To compare the outcomes of participatory and user-centered contextual design, case study methods and the Activity Checklist derived from Activity Theory are used to analyze two sy...
Abstract--Presence, broadly defined as an event publishnotification infrastructure for converged applications, has emerged as a key mechanism for collecting and disseminating conte...