Microarray technology produces large amounts of information to be manipulated by analysis methods, such as biclustering algorithms, to extract new knowledge. All-purpose multivaria...
This work describes an approach for the semi-automatic learning object metadata markup of course’s web pages and their posterior extraction into Scorm Packages. This is identifi...
Software archives contain historical information about the development process of a software system. Using data mining techniques rules can be extracted from these archives. In th...
Abstract-- In this paper, we analyze the security vulnerabilities of a family of ultra-lightweight RFID mutual authentication protocols: LMAP [13], M2 AP [14] and EMAP [15], which ...
This paper describes a method to cope with denormalized relational schemas in a database reverse engineering process. We propose two main steps to irnprove the understanding of da...