Abstract. It is commonly accepted that intrusion detection systems (IDS) are required to compensate for the insufficient security mechanisms that are available on computer systems...
Computer-based advisory systems form with their users composite, human-machine systems. Redundancy and diversity between the human and the machine are often important for the depe...
Lorenzo Strigini, Andrey Povyakalo, Eugenio Alberd...
Failure resilience is one of the desired features of the Internet. Most of the traditional restoration architectures are based on single-failure assumption which is unrealistic. M...
The power of the unaided, individual mind is highly overrated: The Renaissance scholar no longer exists. Although creative individuals are often thought of as working in isolation...
User profiles on today's social networking sites support only a small set of predefined questions. We report on an alternative way for users to richly describe themselves, by...
Casey Dugan, Werner Geyer, Michael J. Muller, Joan...