We live in the information age, where the amount of data readily available already overwhelms our capacity to analyze and absorb it without help from our machines. In particular, ...
The process of monitoring the events occurring in a computer system or network and analyzing them for sign of intrusions is known as intrusion detection system (IDS). This paper p...
In Artificial Intelligence with Coalition Structure Generation (CSG) one refers to those cooperative complex problems that require to find an optimal partition, maximising a soci...
Nicola Di Mauro, Teresa Maria Altomare Basile, Ste...
Here we propose an alternative non-explicit way to take into account the relations among wavelet coefficients in natural images for denoising: we use Support Vector Machines (SVM)...
Valero Laparra, Juan Gutierrez, Gustavo Camps-Vall...
Shannon's Noisy-Channel model, which describes how a corrupted message might be reconstructed, has been the corner stone for much work in statistical language and speech proc...