— Describing and managing activities, resources and constraints of software development processes is a challenging goal for many organizations. A first generation of Software Pro...
Abstract. Current Learning Management Systems were typically conceived to offer a self-contained "one size fits all" learning environment. Adaptive educational systems ha...
The procedure of drug approval is time-consuming, costly and risky. Accidental findings regarding multispecificity of approved drugs led to block-busters in new indication areas. ...
Joachim von Eichborn, Manuela S. Murgueitio, Mathi...
Unwanted traffic injection which amplifies the traffic loading and exhausts network resources is counted as network security threat. Despite of the numerous protection systems, th...
In a flooding-based distributed denial-of-service (DDoS) attack, an adversary attempts to exhaust a target's computing resource. To detect DDoS attacks in a network environme...