∗ As one type of stealthy and hard-to-detect attack, lowrate TCP-targeted DDoS attack can seriously throttle the throughput of normal TCP flows for a long time without being noti...
Little research has examined the relevance of real options for valuation of information technology (IT) investments for prioritizing a portfolio of projects. When the effect of pr...
Indranil R. Bardhan, Robert J. Kauffman, Sanjeewa ...
The resource decisions in software project using cost models do not satisfy managerial decision, as it does not support trade-off analysis among resources. A Bayesian net approach...
Discrimination discovery in databases consists in finding unfair practices against minorities which are hidden in a dataset of historical decisions. The DCUBE system implements t...
A bioinformatics analysis pipeline is often highly elaborate, due to the inherent complexity of biological systems and the variety and size of laboratory publications would be high...
Marco Roos, Sean Bechhofer, Jun Zhao, Paolo Missie...