Many image formation processes are complex interactions of several sub-processes and the analysis of the resulting images requires often to separate the influence of these sub-pr...
The monitoring of unused Internet address space has been shown to be an effective method for characterizing Internet threats including Internet worms and DDOS attacks. Because the...
Evan Cooke, Michael Bailey, Zhuoqing Morley Mao, D...
Abstract. I introduce the notion of knowledge relativity as a proposed conceptual link between different scientific disciplines. Examples from Informatics and Philosophy, particula...
This case study illustrates how the adoption of AI technology can bene t smaller companies as well as major corporations. Pindar Set is a small UK company which has originated the...
Gail Anderson, Andrew Casson-du Mont, Ann Macintos...
Providing good quality of service (e.g., low response times) in distributed computer systems requires measuring enduser perceptions of performance. Unfortunately, such measures ar...