Most visualizations of security-related network data require large amounts of finely detailed, high-dimensional data. However, in some cases, the data available can only be coars...
Jonathan McPherson, Kwan-Liu Ma, Paul Krystosk, To...
While the study of terrorism has expanded dramatically since the 1970s, most analyses are limited to qualitative case studies or quantitative analyses of international incidents on...
Knowledge discovery from data sets can be extensively automated by using data mining software tools. Techniques for mining series of interval events, however, have not been conside...
Roy Villafane, Kien A. Hua, Duc A. Tran, Basab Mau...
Although the mechanisms of human visual understanding remain partially unclear, computational models inspired by existing knowledge on human vision have emerged and applied to seve...
Konstantinos Rapantzikos, Yannis S. Avrithis, Stef...
Integration processes are increasingly used in order to integrate distributed and heterogeneous systems. Although transactional behavior of workflows has been discussed extensively...