Knowledge discovery from data sets can be extensively automated by using data mining software tools. Techniques for mining series of interval events, however, have not been conside...
Roy Villafane, Kien A. Hua, Duc A. Tran, Basab Mau...
Intrusion detection systems (IDSs) must maximize the realization of security goals while minimizing costs. In this paper, we study the problem of building cost-sensitive intrusion...
Wenke Lee, Wei Fan, Matthew Miller, Salvatore J. S...
Given an arbitrary Petri net (PN) structure, which may have uncontrollable and unobservable transitions, the deadlock prevention procedure presented here determines a set of linear...
Marian V. Iordache, John O. Moody, Panos J. Antsak...
The wealth of transcript information that has been made publicly available in recent years has led to large pools of individual web sites offering access to bioinformatics softwar...
Coral del Val, Peter Ernst, Mechthild Falkenhahn, ...
Abstract— Many vision problems can be formulated as minimization of appropriate energy functionals. These energy functionals are usually minimized, based on the calculus of varia...