Software vendors are unaware of how their software performs in the field. They do not know what parts of their software are used and appreciated most and have little knowledge ab...
Henk van der Schuur, Slinger Jansen, Sjaak Brinkke...
This paper describes results concerning the robustness and generalization capabilities of kernel methods in detecting coordinated distributed multiple attacks (CDMA) using network...
Srinivas Mukkamala, Krishna Yendrapalli, Ram B. Ba...
The need to access spatial data at multiple levels of detail is a fundamental requirement of many applications of geographical information, yet conventional spatial database access...
The flexible integration of a range of disparate IT applications is a key requirement for today's global enterprises. The virtual enterprise, formed by a collection of collab...
: In an ideal scenario of intelligent machine tools [18] the human mechanist was almost replaced by the controller. During the last decade many efforts have been made to get closer...