Computer security systems protect computers and networks from unauthorized use by external agents and insiders. The similarities between computer security and the problem of prote...
Stephanie Forrest, Steven A. Hofmeyr, Anil Somayaj...
In this paper we propose a new scheme for software obfuscation and license protection that is based on an original transformation of the program’s call tree. The idea is based on...
As call centersbecomemorepervasive,the customersseek individualized service and greater attention. The call centers are becoming the contact centers - a one-stop, singleinterfacef...
This paper presents a model for representing the pro ciency of users in a CALL system by recording their performance on speci c grammatical features. The model will be used both t...
The search for patterns or motifs in data represents an area of key interest to many researchers. In this paper we present the Motif Tracking Algorithm, a novel immune inspired pat...