In the rapidly evolving field of genomics, many clustering and classification methods have been developed and employed to explore patterns in gene expression data. Biologists face...
Xueli Liu, Sheng-Chien Lee, George Casella, Gary F...
Intrusion detection is the process of monitoring the events occurring in a computer system or network and analyzing them for signs of intrusions, defined as attempts to compromis...
Background: Identification and characterization of novel Plasmodium gene families is necessary for developing new anti-malarial therapeutics. The products of the Plasmodium falcip...
Lisa C. Romero, Thanh Vinh Nguyen, Benoit Deville,...
We are developing technology for generating English textual summaries of time-series data, in three domains: weather forecasts, gas-turbine sensor readings, and hospital intensive...
Somayajulu Sripada, Ehud Reiter, Jim Hunter, Jin Y...
Most intrusion detection systems apply the misuse detection approach. Misuse detection compares recorded audit data with predefined patterns denoted as signatures. A signature is ...