Genomics data has many properties that make it different from "typical" relational data. The presence of multi-valued attributes as well as the large number of null valu...
Amal Perera, Anne Denton, Pratap Kotala, William J...
—Protecting and securing sensitive information are critical challenges for businesses. Deliberate and intended actions such as malicious exploitation, theft or destruction of dat...
The parsimony pressure method is perhaps the simplest and most frequently used method to control bloat in genetic programming. In this paper we first reconsider the size evolutio...
Academic literature has documented for a long time the existence of important price gains in the first trading day of initial public offerings (IPOs). Most of the empirical analys...
In this paper we discuss a data mining framework for constructing intrusion detection models. The key ideas are to mine system audit data for consistent and useful patterns of pro...