— It is natural to envisage that in a telephone network, some telephone numbers originate or receive more calls than others. Indeed, real-life data have verified the conjecture ...
— In this paper, we propose an adaptive capacity allocation scheme at the call level for a blocked call cleared loss system. The scheme aims to maintain the connection blocking p...
When using object-oriented frameworks it is easy to overlook certain important method calls that are required at particular places in code. In this paper, we provide a comprehensiv...
Traditionally, intrusion detection systems detect intrusions at the operating system (OS) level. In this paper we explore the possibility of detecting intrusion at the application...
Abstract. The aim of our research was to apply well-known data mining techniques (such as linear neural networks, multi-layered perceptrons, probabilistic neural networks, classifi...
Marcin Paprzycki, Ajith Abraham, Ruiyuan Guo, Srin...