One of the biggest obstacles faced by user command based anomaly detection techniques is the paucity of data. Gathering command data is a slow process often spanning months or yea...
We introduce the class of Rigid Tree Automata (RTA), an extension of standard bottom-up automata on ranked trees with distinguished states called rigid. Rigid states define a res...
Effective security management depends upon good risk management, which is itself based upon a reliable risk assessment, involving data collection of all the facets influencing sys...
CST’s Baby CareLink provides a ‘collaborative healthware’ environment for parents of premature infants that incorporates just-in-time learning as one means of knowledge explo...
Howard Goldberg, Alfredo Morales, David MacMillan,...
Background: Backtranslation is the process of decoding a sequence of amino acids into the corresponding codons. All synthetic gene design systems include a backtranslation module....
Alfredo Ferro, Rosalba Giugno, Giuseppe Pigola, Al...