Operational Data Analysis (ODA) automatically 1) monitors the performance of a computer through time, 2) stores such information in a data repository, 3) applies data-mining techn...
Most of the current Intrusion Detection Systems (IDS) examine all data features to detect intrusion or misuse patterns. Some of the features may be redundant or contribute little (...
Srilatha Chebrolu, Ajith Abraham, Johnson P. Thoma...
The incorporation of a trust network among the users of a recommender system (RS) proves beneficial to the quality and amount of recommendations. Involving also distrust can offe...
Experiences of intimacy and connectedness through social networks are vital to human sense of well-being. We live in an electronic habitat. Electronic mail functions as a medium o...
Background: Most existing algorithms for the inference of the structure of gene regulatory networks from gene expression data assume that the activity levels of transcription fact...