Abstract. Most intrusion detection systems deployed today apply misuse detection as detection procedure. Misuse detection compares the recorded audit data with predefined patterns,...
— We propose a novel approach for acquisition and development of behaviors through observation in multi-agent environment. Observed behaviors of others give fruitful hints for a ...
Abstract. Searching and mining nuclear magnetic resonance (NMR)spectra of naturally occurring substances is an important task to investigate new potentially useful chemical compoun...
Alexander Hinneburg, Andrea Porzel, Karina Wolfram
This paper presents a new interaction technique for camera-enabled mobile devices. The handheld device can be used for writing just by moving the device. In our method, interframe...
We describe a new course designed to introduce engineering students to computational thinking. One of the most significant challenges in teaching an introductory-level applied co...