: The success and the acceptance of intrusion detection systems essentially depend on the accuracy of their analysis. Inaccurate signatures strongly trigger false alarms. In practi...
Higher educational institutions are just like companies forced to adapt to the ever faster changing environment. There are several obstacles in the way of introducing e-learning i...
Jaka Linic, Jurij Jaklic, Mojca Indihar Stemberger
This paper describes our research effort to employ Grid technologies to enable the development of geoscience applications by integrating workflow technologies with data mining r...
Gianluigi Folino, Agostino Forestiero, Giuseppe Pa...
Humans throughout history have always sought to mimic the appearance, mobility, functionality, intelligent operation, and thinking process of biological creatures. This field of b...
One of the major challenges in the design of social technologies is the evaluation of their qualities of use and how they are appropriated over time. While the field of HCI abound...