Access control in enterprises is a key research area in the realm of Computer Security because of the unique needs of the target enterprise. As the enterprise typically has large ...
Rafae Bhatti, James Joshi, Elisa Bertino, Arif Gha...
The aim of Participatory Design (PD) is to involve the users in the design. Even though the research has shown the success of PD projects in empowering users, little has been said...
Background: In the context of the BioCreative competition, where training data were very sparse, we investigated two complementary tasks: 1) given a Swiss-Prot triplet, containing...
We developed Relational Data Mining approach which allows to overcome essential limitations of the Data Mining and Knowledge Discovery techniques. In the paper the approach was im...
I. V. Khomicheva, Eugenii E. Vityaev, Elena A. Ana...
Wepresent the prototype of a software system, cMledGeneQuiz,for large-scale biological sequence analysis. The system was designed to meet the needs that arise in computational seq...
Michael Scharf, Reinhard Schneider, Georg Casari, ...