— In this paper, we present a strategy to detect an intrusion using fault localization tools. We propose an intrusion detection system to detect a self-contained in-band wormhole...
This paper proposes a gender recognition scheme focused on local appearance-based features to describe the top half of the face. Due to the fact that only the top half of the face ...
Concurrency fault are difficult to find because they usually occur under specific thread interleavings. Fault-detection tools in this area find data-access patterns among threa...
Data mining can be used to model crime detection problems. Crimes are a social nuisance and cost our society dearly in several ways. Any research that can help in solving crimes f...
Background: Identification of protein interacting sites is an important task in computational molecular biology. As more and more protein sequences are deposited without available...