Intrusion detection is the process of monitoring the events occurring in a computer system or network and analyzing them for signs of intrusions, defined as attempts to compromis...
This paper describes how design information, in our case UML specifications, can be used to evolve a software system and validate the consistency of such an evolution. This work c...
This paper describes a novel use of evolutionary techniques to curate a main stream art show, Tabula Rasa. This allowed an openended approach to curation that was entirely in keepi...
Constructing a fingerprint database is important to evaluate the performance of automatic fingerprint recognition systems. Because of the difficulty in collecting fingerprint sampl...
This research aims at studying the effects of exchanging information during the learning process in Multiagent Systems. The concept of advice-exchange, introduced in (Nunes and Ol...