Abstract. Common software-protection systems attempt to detect malicious observation and modification of protected applications. Upon tamper detection, anti-hacking code may produ...
Mariusz H. Jakubowski, Chit Wei Saw, Ramarathnam V...
Abstract. Regression models are often required for controlling production processes by predicting parameter values. However, the implicit assumption of standard regression techniqu...
Frank Rosenthal, Peter Benjamin Volk, Martin Hahma...
Abstract. The ongoing trend towards open data embraced by the Semantic Web has started to produce a large number of data sources. These data sources are published using RDF vocabul...
Manuel Salvadores, Gianluca Correndo, Bene Rodrigu...
Abstract. Most previous methods for generic object recognition explicitly or implicitly assume that an image contains objects from a single category, although objects from multiple...
Takahiro Okabe, Yuhi Kondo, Kris M. Kitani, Yoichi...
Abstract—Web service compositions (WSC), as part of a serviceoriented architecture (SOA), have to be managed to ensure compliance with guaranteed service levels. In this context,...
Christof Momm, I. P. Hallerbach, Sebastian Abeck, ...