: An intrusion detection system should support the operator of the system. Thus, in addition to producing alerts, it should allow for easy insertion of new detection algorithms. It...
Ulf Larson, Stefan Lindskog, Dennis K. Nilsson, Er...
Middleware implementation of various critical services required by large-scale and complex real-time applications on top of COTS operating system is currently an approach of growi...
Eltefaat Shokri, Patrick Crane, K. H. Kim, Chittur...
The paper investigates the use of computational intelligence for adaptive lesson presentation in a Web-based learning environment. A specialized connectionist architecture is devel...
Kyparisia A. Papanikolaou, George D. Magoulas, Mar...
The use of handheld networked devices to access information systems by people moving around is spreading rapidly. Systems being used in this way typically face dynamic variation in...
Svein O. Hallsteinsen, Jacqueline Floch, Erlend St...
—The Service-Oriented Architecture (SOA) leverages ice abstraction to enable the development of modular, loose-coupled and distributed applications. In order to use such an archi...