Attackers take advantage of any security breach to penetrate an organisation perimeter and exploit hosts as stepping stones to reach valuable assets, deeper in the network. The exp...
Virginia N. L. Franqueira, Raul H. C. Lopes, Pasca...
Abstract Traditional financial analysis systems utilize lowlevel price data as their analytical basis. For example, a decision-making system for stock predictions regards raw price...
Based on a revision of the common task understanding in model-based approaches a formal meta model is proposed which allows more expressive task descriptions. A task is considered ...
This paper reports on applying the ODP enterprise viewpoint in the domain of tele-education. The work is conducted as part of a research activity1 that aims at designing a tele-ed...
Cees Volman, Val Jones, Marten van Sinderen, Ing W...
This chapter proposes a representation of rigid three-dimensional (3D) objects in terms of local affine-invariant descriptors of their images and the spatial relationships between ...
Fred Rothganger, Svetlana Lazebnik, Cordelia Schmi...