— Though destructive to network functions, insider attackers are not detectable with only the classic cryptographybased techniques. Many mission-critic sensor network application...
Negative selection algorithms for hamming and real-valued shape-spaces are reviewed. Problems are identified with the use of these shape-spaces, and the negative selection algori...
Thomas Stibor, Philipp H. Mohr, Jonathan Timmis, C...
multiQ is a passive capacity measurement tool suitable for largescale studies of Internet path characteristics. It is the first passive tool that discovers the capacity of multip...
Sachin Katti, Dina Katabi, Charles Blake, Eddie Ko...
Requirements prioritization plays a key role in the requirements engineering process, in particular with respect to critical tasks such as requirements negotiation and software re...
Paolo Avesani, Cinzia Bazzanella, Anna Perini, Ang...
A novel maximal figure-of-merit (MFoM) learning approach to text categorization is proposed. Different from the conventional techniques, the proposed MFoM method attempts to integ...