Computing methods that allow the efficient and accurate processing of experimentally gathered data play a crucial role in biological research. The aim of this paper is to present a...
We describe a mechanism which recognizes a user's intentions from short-form rejoinders to arguments generated from Bayesian networks. The mechanism builds candidate reasoning...
Ingrid Zukerman, Nathalie Jitnah, Richard McConach...
We use reconfigurable hardware to construct a high throughput Bayesian computing machine (BCM) capable of evaluating probabilistic networks with arbitrary DAG (directed acyclic gr...
Intrusion detection systems (IDSs) attempt to identify attacks by comparing collected data to predefined signatures known to be malicious (misuse-based IDSs) or to a model of lega...
An important decision problem in many software projects is when to stop testing and release software for use. For many software products, time to market is critical and therefore ...
Norman E. Fenton, Martin Neil, William Marsh, Pete...