Abstract. Anomaly detection is based on profiles that represent normal behaviour of users, hosts or networks and detects attacks as significant deviations from these profiles. In t...
Abstract. Location-based Services are emerging as popular applications in pervasive computing. Spatial k-anonymity is used in Locationbased Services to protect privacy, by hiding t...
This paper presents a mobile agent approach that aims at satisfying the following requirements of open Internet-based electronic service markets: the mobile agent system should be...
Boris Liberman, Frank Griffel, Michael Merz, Winfr...
Abstract. The generation of formal poetry involves both complex creativity usually exercised by a human poet - and strict algorithmic restrictions regarding the metrical structure ...
Tempus Fugit (“Time Flies”) is the first of a new generation of Personal Information Management (PIM) systems. A PIM system incorporates an electronic calendar, “to-do” li...
Daniel Alexander Ford, Joann Ruvolo, Stefan Edlund...