The ability to inspect both packet headers and payloads to identify attack signatures makes network intrusion detection system (NIDS) a promising approach to protect Internet syste...
In this paper we redefine and generalize the classic k-nearest neighbors (k-NN) voting rule in a Bayesian maximum-a-posteriori (MAP) framework. Therefore, annotated examples are u...
Paolo Piro, Richard Nock, Frank Nielsen, Michel Ba...
Ever wondered why open source finally yields products that work? Eric Raymod discusses that in this paper using the bazaar as a metaphor for open source hacker developed software t...
We present the results of an experiment investigating the effects of a talking head's gaze behavior on the user's quality assessment of the interface. We compared a vers...
Ivo van Es, Dirk Heylen, Betsy van Dijk, Anton Nij...
We define an interpretation of the Isabelle/HOL logic in HOL Light and its metalanguage, OCaml. Some aspects of the Isabelle logic are not representable directly in the HOL Light o...