The proliferation of malware has presented a serious threat to the security of computer systems. Traditional signature-based antivirus systems fail to detect polymorphic and new, ...
Machine learning and data mining can be effectively used to model, classify and discover interesting information for a wide variety of data including email. The Email Mining Toolk...
In the initial stage of sequence analysis, a biologist is first faced with the questions about how to choose the best tool to align sequences of interest and how to analyze and v...
Arthur Chun-Chieh Shih, D. T. Lee, Laurent Lin, Ch...
This study compares two ways of presenting a table of contents (TOC) in academic web documents: showing the TOC on a separate screen (SE version) and showing the TOC on the same s...
Online scheduling with a buffer is a semi-online problem which is strongly related to the basic online scheduling problem. Jobs arrive one by one and are to be assigned to paralle...