—We present a security system consisting of an arbitrary number of entries, sensors and agents. The intelligent integrated system is based on user modeling, i.e. models of their ...
Erik Dovgan, Bostjan Kaluza, Tea Tusar, Matjaz Gam...
Abstract. Verification by network invariants is a heuristic to solve uniform verification of parameterized systems. Given a system P, a network invariant for P is that abstracts th...
Future collaborative learning technologies are characterized by the CSCL community as highly malleable and flexible. A promising approach for meeting these expectations is to use ...
Machine learning has great utility within the context of network intrusion detection systems. In this paper, a behavior analysis-based learning framework for host level network in...
Haiyan Qiao, Jianfeng Peng, Chuan Feng, Jerzy W. R...
This paper addresses the interaction between randomization, with restart strategies, and learning, an often crucial technique for proving unsatisfiability. We use instances of SAT ...