The main contribution of this paper is to suggest a novel technique for automatic creation of accurate ensembles. The technique proposed, named GEMS, first trains a large number o...
Abstract. Anomaly detection, detection of deviations from what is considered normal, is an important complement to misuse detection based on attack signatures. Anomaly detection in...
Evaluating a query can involve manipulation of large volumes of temporary data. When the volume of data becomes too great, activities such as joins and sorting must use disk, and ...
This paper discusses the development of a computational modeling and analysis toolkit to construct, animate, and biomechanically analyze sophisticated models of vertebrates. Users...
Single Display Groupware (SDG) supports face-to-face collaborators working over a single shared display, where all people have their own input device Although SDG is simple in conc...