Intruders often want to analyze traffic pattern to get information for his some malicious activities in ultra-secure network. This paper presents a general approach to prevent tra...
Biomarker discovery for complex diseases is a challenging problem. Most of the existing approaches identify individual genes as disease markers, thereby missing the interactions a...
Rohit Gupta, Smita Agrawal, Navneet Rao, Ze Tian, ...
Protein data contain discriminative patterns that can be used in many beneficial applications if they are defined correctly. In this work sequential pattern mining (SPM) is utiliz...
Themis P. Exarchos, Costas Papaloukas, Christos La...
Retrofitting security implementations to a released software-intensive system or to a system under development may require significant architectural or coding changes. These late...
We present a weakly nonlinear analysis of our recently developed model for the formation of crime patterns. Using a perturbative approach, we find amplitude equations that govern t...
Martin B. Short, Andrea L. Bertozzi, P. J. Brantin...