— The need for self-healing software to respond with a reactive, proactive or preventative action as a result of changes in its environment has added the non-functional requireme...
In this paper we address two aspects related to the exploitation of Support Vector Machines (SVM) for classification in real application domains, such as the detection of objects ...
A large number of methods for circle detection has been studied in the last years for numerous image processing applications. The application domain considered in this paper is th...
Abstract. Most intrusion detection systems deployed today apply misuse detection as detection procedure. Misuse detection compares the recorded audit data with predefined patterns,...
Source code cloning does not happen within a single system only. It can also occur between one system and another. We use the term code sibling to refer to a code clone that evolv...