In this paper, we propose a new intrusion detection model, which keeps advantages of existing misuse detection model and anomaly detection model and resolves their problems. This ...
Abstract. We describe an architecture for building speech-enabled conversational agents, deployed as self-contained Web services, with ability to provide inference processing on ve...
Abstract. Most e-mail readers spend a non-trivial amount of time regularly deleting junk e-mail (spam) messages, even as an expanding volume of such e-mail occupies server storage ...
Cities on a map that are directly connected by a route are judged closer than unconnected cities. This route effect has been attributed to memory distortions induced by the integra...
Alexander Klippel, Lothar Knuf, Bernhard Hommel, C...
Continued research into distributed agent-based systems and evolving web based technologies are opening up tremendous possibilities for the deployment of large scale and highly ex...