Intrusion detection systems (IDSs) have reached a high level of sophistication and are able to detect intrusions with a variety of methods. Unfortunately, system administrators ne...
Formal modelling, in interactive system design, has received considerably less real use than might have been hoped. Heavy weight formal methods can be expensive to use, with poor c...
Of the many tuning parameters available in a database management system (DBMS), one of the most crucial to performance is the buffer pool size. Choosing an appropriate size, howev...
This paper studies activity cycle diagrams (ACD) for modeling construction processes using activities as the basic elements. An ACD is obtained by combining the activity cycles of...
Abstract— Decision trees, being human readable and hierarchically structured, provide a suitable mean to derive state-space abstraction and simplify the inclusion of the availabl...
Masoud Asadpour, Majid Nili Ahmadabadi, Roland Sie...