Abstract. This paper addresses the detection and reporting of abnormal building access with a wireless sensor network. A common office room, offering space for two working persons...
On December 26, 2004, countries in the Indian Ocean basin were struck by a tsunami generated by a large magnitude earthquake just south of the western tip of Sumatra. Observations...
Richard G. Little, William A. Wallace, Thomas A. B...
Adoption of advanced automated SE (ASE) tools would be favored if a business case could be made that these tools are more valuable than alternate methods. In theory, software pred...
Tim Menzies, Oussama El-Rawas, Jairus Hihn, Martin...
Abstract. The application of reinforcement learning algorithms to multiagent domains may cause complex non-convergent dynamics. The replicator dynamics, commonly used in evolutiona...
Alessandro Lazaric, Jose Enrique Munoz de Cote, Fa...
Firewalls are the mainstay of enterprise security and the most widely adopted technology for protecting private networks. The quality of protection provided by a firewall directly...