Differentiating anomalous network activity from normal network traffic is difficult and tedious. A human analyst must search through vast amounts of data to find anomalous sequenc...
We propose a method to search for a lemma in a goq proof library by using the lemma type as a key. The method is based on the concept of type isomorphism developed within the funct...
Data mining is playing an important role in decision making for business activities and governmental administration. Since many organizations or their divisions do not possess the...
Information system models commonly describe organizations in terms of the structure of the data they use, the organization of the processes they perform and the operations that wil...
This paper describes an attempt to model the method of generating a fact from the opinions of other persons or of institutions as a process which is based on knowledge about these...