The widespread use of artificial neural networks and the difficult work regarding the correct specification (tuning) of parameters for a given problem are the main aspects that mot...
- There are many applications dealing with incomplete data sets that take different approaches to making imputations for missing values. Most tackle the problem for numerical input...
In this paper, we propose to apply an NA-tree in the Chord system to encode spatial region data in the data key part used in the hash function to data search. That is, we combine t...
As a tractable description logic, DL-Lite provides a good compromise between expressive power and computational complexity of inference. It is therefore important to study ways of ...
Abstract— In this paper we present a novel intrusion detection architecture based on Idiotypic Network Theory (INIDIS), that aims at dealing with large scale network attacks feat...
Marek Ostaszewski, Pascal Bouvry, Franciszek Sered...