This paper explores runtime reconfiguration of custom instructions in the context of multi-tasking real-time embedded systems. We propose a pseudo-polynomial time algorithm that mi...
This paper argues about the deployment positions of Network-based Intrusion Detection System and suggests the "Distributed Network Security Sensors" distributed among the...
This paper reports the results of an international web-based survey on the use of field studies in the design and evaluation of interactive systems, which was conducted between De...
Kelly Monahan, Mia Lahteenmaki, Sharon McDonald, G...
Creativity is a much needed quality in today's business and therefore an important research area. Whilst implementing and evaluating computer support for electronic brainstor...
A successful detection and classification system must have two properties: it should be general enough to compensate for intra-class variability and it should be specific enough to...