Detection and mitigation of DDoS attacks in SDN: A comprehensive review, research challenges and future directions
Many security solutions have been proposed in the past to protect Internet architecture from
a diversity of malware. However, the security of the Internet and its applications is still an …
a diversity of malware. However, the security of the Internet and its applications is still an …
The integrated information theory of consciousness: an updated account
G Tononi - Archives italiennes de biologie, 2012 - architalbiol.org
This article presents an updated account of integrated information theory of consciousness
(IIT) and some of its implications. IIT stems from thought experiments that lead to …
(IIT) and some of its implications. IIT stems from thought experiments that lead to …
[BOOK][B] An introduction to Kolmogorov complexity and its applications
Ming Li Paul Vitányi Fourth Edition Page 1 An Introduction to Kolmogorov Complexity and Its
Applications Ming Li Paul Vitányi Fourth Edition Texts in Computer Science Page 2 Texts in …
Applications Ming Li Paul Vitányi Fourth Edition Texts in Computer Science Page 2 Texts in …
[BOOK][B] Encyclopedia of distances
Encyclopedia of Distances is the result of re-writing and extending our Dictionary of
Distances published in 2006 (and put online http://www. sciencedirect. com/science/book …
Distances published in 2006 (and put online http://www. sciencedirect. com/science/book …
The google similarity distance
Words and phrases acquire meaning from the way they are used in society, from their
relative semantics to other words and phrases. For computers, the equivalent of" society" is" …
relative semantics to other words and phrases. For computers, the equivalent of" society" is" …
The similarity metric
A new class of distances appropriate for measuring similarity relations between sequences,
say one type of similarity per distance, is studied. We propose a new" normalized …
say one type of similarity per distance, is studied. We propose a new" normalized …
Clustering by compression
We present a new method for clustering based on compression. The method does not use
subject-specific features or background knowledge, and works as follows: First, we …
subject-specific features or background knowledge, and works as follows: First, we …
Measuring ease of use of mobile applications in e-commerce retailing from the perspective of consumer online shop** behaviour patterns
X Li, X Zhao, W Pu - Journal of Retailing and Consumer Services, 2020 - Elsevier
Scientifically judging and comparing different mobile e-commerce retailing applications
(apps) are essential to increase online shop** efficiency and enhance design for system …
(apps) are essential to increase online shop** efficiency and enhance design for system …
[BOOK][B] Handbook of natural language processing
N Indurkhya, FJ Damerau - 2010 - taylorfrancis.com
The Handbook of Natural Language Processing, Second Edition presents practical tools
and techniques for implementing natural language processing in computer systems. Along …
and techniques for implementing natural language processing in computer systems. Along …
“Low-resource” text classification: A parameter-free classification method with compressors
Deep neural networks (DNNs) are often used for text classification due to their high
accuracy. However, DNNs can be computationally intensive, requiring millions of …
accuracy. However, DNNs can be computationally intensive, requiring millions of …