- Security is becoming a critical part of organizational information systems. Intrusion Detection System (IDS) is an important detection that is used as a countermeasure to preserv...
Chang-Tien Lu, Arnold P. Boedihardjo, Prajwal Mana...
This paper presents a technique for recovering the high level design of legacy software systems according to user defined architectural plans. Architectural plans are represented...
The paper presents and compares the data mining techniques for selection of the diagnostic features in the problem of blood cell recognition in leukemia. Different techniques are c...
One of the major problems in biological data integration is that many data sources are stored as flat-files, with a variety of different layouts. Integrating data from such sour...
Kaushik Sinha, Xuan Zhang, Ruoming Jin, Gagan Agra...
This paper describes a computer component manufacturing scenario which concentrates on the application of data mining techniques to improve information management and process impr...
W. M. Gibbons, Mervi Ranta, T. M. Scott, Martti M&...