In the paper we present a new approach based on application of neural networks to detect SQL attacks. SQL attacks are those attacks that take advantage of using SQL statements to ...
— This paper presents an algorithm for adapting periodic behavior to gradual shifts in task parameters. Since learning optimal control in high dimensional domains is subject to t...
With the field of wireless sensor networks rapidly maturing, the focus shifts from “easy” deployments, like remote monitoring, to more difficult domains where applications imp...
Mario Strasser, Andreas Meier, Koen Langendoen, Ph...
This paper deals with the CBIR of old printed graphics (of XVI◦ and XVII◦ centuries) like the headpieces, the pictures and the ornamental letters. These graphical parts are pre...
Abstract. The recently proposed notion of an elementary set yielded a refinement of the theorem on loop formulas, telling us that the stable models of a disjunctive logic program ...