Abstract. It is commonly accepted that intrusion detection systems (IDS) are required to compensate for the insufficient security mechanisms that are available on computer systems...
The applications described here follow up the works performed in the recent last years by the Data Structures and Computational Linguistics Group at Las Palmas de Gran Canaria Univ...
Energy consumption is a major and costly problem in data centers. A large fraction of this energy goes to powering idle machines that are not doing any useful work. We identify tw...
Andrew Krioukov, Prashanth Mohan, Sara Alspaugh, L...
We present the design and evaluation of an interactive children’s book. It is implemented as an interactive web site, where children worldwide can create collages around a commo...
Carmen Eisendle, Christine Schnappinger, Karin Gum...
—This paper describes the design and implementation of an inference engine for the execution of Fuzzy Inference Systems (FIS), the architecture of the system is presented, and th...