Background: High-throughput experiments, such as with DNA microarrays, typically result in hundreds of genes potentially relevant to the process under study, rendering the interpr...
Rob Jelier, Guido Jenster, Lambert C. J. Dorssers,...
Abstract. For some years now ontologies have been used in Social Science, e.g. , in annotation of newspaper articles for disambiguating concepts within Media Analysis. These ontolo...
Shenghui Wang, Stefan Schlobach, Janet Takens, Wou...
Abstract. In this paper, we introduce a prototype-based clustering algorithm dealing with graphs. We propose a hypergraph-based model for graph data sets by allowing clusters overl...
Abstract. We propose a new technique called Differential Cluster Analysis for side-channel key recovery attacks. This technique uses cluster analysis to detect internal collisions ...
Complementary security systems are widely deployed in networks to protect digital assets. Alert correlation is essential to understanding the security threats and taking appropria...