: Many researchers are interesting in applying the neural networks methods to financial data. In fact these data are very complex, and classical methods do not always give satisfac...
: The success and the acceptance of intrusion detection systems essentially depend on the accuracy of their analysis. Inaccurate signatures strongly trigger false alarms. In practi...
We discuss a lossless data compression system that uses fixed Tree Machines to encode data. The idea is to create a sequence of Tree Machines and a robust escape method aimed at p...
Architectural considerations play a key role in the success of any software-based development project. Architecture evaluation is an early risk reduction method for identifying ri...
Statistical database protection is a part of information security which tries to prevent published statistical information (tables, individual records) from disclosing the contrib...