: An intrusion detection system should support the operator of the system. Thus, in addition to producing alerts, it should allow for easy insertion of new detection algorithms. It...
Ulf Larson, Stefan Lindskog, Dennis K. Nilsson, Er...
The paper describes the model, implementation and experimental evaluation of a distributed Kohonen Neural Network application (Kohonen Application). The aim of this research is to...
Network data models are widely used to describe the connectivity between spatial features in GIS architectures. Recent applications demand that such models are editable in multius...
Petko Bakalov, Erik G. Hoel, Wee-Liang Heng, Vassi...
Rapid changes in the business environment call for more flexible and adaptive workflow systems. Researchers have proposed that Workflow Management Systems (WfMSs) comprising multi...
Bastin Tony Roy Savarimuthu, Maryam Purvis, Martin...
Conventional resource management systems use a system model to describe resources and a centralized scheduler to control their allocation. We argue that this paradigm does not ada...