In the last ten years, multivariate cryptography has emerged as a possible alternative to public key cryptosystems based on hard computational problems from number theory. Notably,...
The paper presents an approach for the anomaly detection problem based on principles of immune systems. Flexibility and efficiency of the anomaly detection system are achieved by ...
Marek Ostaszewski, Franciszek Seredynski, Pascal B...
3D cell culture assays have emerged as the basis of an improved model system for evaluating therapeutic agents, molecular probes, and exogenous stimuli. However, there is a gap in...
Ju Han, Hang Chang, Qing Yang, Mary Helen Barcello...
Traditional database security mechanisms are very limited in defending against data attacks. Authorized but malicious transactions can make a database useless by impairing its int...
In this paper neuro-fuzzy synergism is applied to implement content sequencing in adaptive hypermedia systems. The level of understanding of the learner is used to construct lesson...
Kyparisia A. Papanikolaou, George D. Magoulas, Mar...