Launching a denial of service (DoS) attack is trivial, but detection and response is a painfully slow and often a manual process. Automatic classification of attacks as single- o...
Alefiya Hussain, John S. Heidemann, Christos Papad...
Abstract: Most of ambient intelligence studies have tried to employ inductive methods (e.g., data mining) to discover useful information and patterns from data streams on sensor ne...
We present a QoS management framework that enables us to quantitatively measure QoS, and to analytically plan and allocate resources. In this model, end users' quality prefer...
Chen Lee, John P. Lehoczky, Ragunathan Rajkumar, D...
Breast biopsy guided by imaging techniques such as ultrasound is widely used to evaluate suspicious masses within the breast. Currently, ultrasound imaging does not allow live guid...
Vishnu Mallapragada, Nilanjan Sarkar, Tarun Kanti ...
Abstract. One of the most frequently used inference services of description logic reasoners classifies all named classes of OWL ontologies into a subsumption hierarchy. Due to emer...