The applicability of network-based computing depends on the availability of the underlying network bandwidth. However, network resources are shared and the available network bandw...
Intrusion Detection Systems (IDS) have become widely used tools for ensuring system and network security. Among many other challenges, contemporary IDS have to cope with increasin...
This paper introduces Hydra, a platform that we are developing for highly survivable and secure data storage systems that distribute information over networks and adapt timely to ...
Resource Space Model (RSM) is a semantic model to manage and share heterogeneous resources on the Internet. This paper focuses on the general architecture, physical implementation ...
In this paper we report on the acquisition and content of a new database intended for developing audio-visual speech recognition systems. This database supports a speaker dependen...