Most current anomaly Intrusion Detection Systems (IDSs) detect computer network behavior as normal or abnormal but cannot identify the type of attacks. Moreover, most current intr...
Abstract. We propose a verification method for parameterized systems with global conditions. The method is based on context-sensitive constraints, a symbolic representation of infi...
Parosh Aziz Abdulla, Giorgio Delzanno, Ahmed Rezin...
In this paper a novel system for image replica detection is presented. The system uses color-based descriptors in order to extract robust features for image representation. These ...
Java has an important role in building distributed object oriented web enabled applications. In the article an analysis of two distributed object models in context of Java languag...
Marjan Hericko, Matjaz B. Juric, Ales Zivkovic, Iv...
Enterprise systems entail complex organizational interventions. Accurately gauging the impact of any complex information system requires understanding its multidimensionality, and...