The development of user interfaces based on vision and speech requires the solution of a challenging statistical inference problem: The intentions and actions of multiple individu...
Abstract. Network Intrusion Detection Systems (NIDS) aim at preventing network attacks and unauthorised remote use of computers. More accurately, depending on the kind of attack it...
Abstract: Recently, Distributed Hash Tables evolved to a preferred approach for decentralized data management in widely distributed systems. Due to their crucial characteristics ā...
Tobias Heer, Heiko Niedermayer, Leo Petrak, Simon ...
This work proposes a theoretical guideline in the speciļ¬c area of Frequent Itemset Mining (FIM). It supports the hypothesis that the use of neural network technology for the prob...
Abstract. Multicast content delivery can be expected to become a major source of revenue with the increase of private broadband fixed and mobile communications. Several multicast a...