Powerful microcontrollers are used as parts of most home and office appliances of today. Integrating web servers to these intelligent devices will aid in controlling them over th...
An approach for detecting feature interactions in IETF’s Call Processing Language (CPL) scripts is presented. The approach is logic based in the sense that it uses a logic repre...
Anomaly detection holds great potential for detecting previously unknown attacks. In order to be effective in a practical environment, anomaly detection systems have to be capable...
We describe a minimalist methodology to develop usage-based recommender systems for multimedia digital libraries. A prototype recommender system based on this strategy was impleme...
Johan Bollen, Michael L. Nelson, Gary Geisler, Raq...
The process of monitoring the events occurring in a computer system or network and analyzing them for sign of intrusions is known as intrusion detection system (IDS). This paper p...
Bluetooth is a new technology for low-cost, low-power, and short-range wireless communication. By constructing a piconet, Bluetooth device establishes link and communicates with o...
Developing applications and deploying services for mobile users raises a number of issues and challenges that must be successfully addressed before the era of truly ubiquitous com...
Michael J. O'Grady, Gregory M. P. O'Hare, C. Donag...
Composite web services are defined using the industry-standard language BPEL (Business Process Execution Logic). There is a strong need for graphical and automated support for th...