We apply advanced agent trust modeling techniques to identify malicious traffic in computer networks. Our work integrates four state-of-the-art techniques from anomaly detection,...
This paper describes a mode detection system for online pen input that employs a Bayesian network to combine classification results and context information. Previous monolithic c...
— Dynamic optimization of UMTS systems has been gaining a growing interest by the research community. In this context, the current paper concentrates on dynamic automated tuning ...
Creating courses by combining Learning Objects (LOs) sourced from third parties, known as courseware, is becoming more popular of late. Although courseware has advantages over tra...
This paper presents a dissertation project on business-integrated, service-oriented learning architectures. The isolation of corporate learning management from core business functi...