It is generally agreed that two key points always attract special concerns during the modelling of anomaly-based intrusion detection. One is the techniques about discerning two cl...
In this paper we present a mechanism for serializing the execution-state of a distributed Java application that is implemented on a conventional Object Request Broker (ORB) archite...
Abstract A knowledge-guided approach to automatic classification of Coastal Zone Color images of the West Florida Shelf is described. The approach is used to identify red tides on ...
Mingrui Zhang, Lawrence O. Hall, Dmitry B. Goldgof...
In a mobile environment, querying a database at a stationary server from a mobile client is expensive due to the limited bandwidth of a wireless channel and the instability of the ...
In computer networks, the Strict Priority (SP) discipline is perhaps the most common and simplest method to schedule packets from different classes of applications, each with diver...