Intrusion detection systems (IDS) often provide poor quality alerts, which are insufficient to support rapid identification of ongoing attacks or predict an intruder’s next lik...
We present a systematic comparison of machine learning methods applied to the problem of fully automatic recognition of facial expressions, including AdaBoost, support vector mach...
Gwen Littlewort, Marian Stewart Bartlett, Ian R. F...
We consider a supply–assembly–store chain with produce-to-stock strategy, which comprises a set of component suppliers, a mixed-model assembly line with a constantly moving co...
Contemporary information systems (e.g., WfM, ERP, CRM, SCM, and B2B systems) record business events in so-called event logs. Business process mining takes these logs to discover p...
Wil M. P. van der Aalst, Hajo A. Reijers, A. J. M....
A unified evolutionary approach to coplanar radiotherapy inverse planning is proposed. It consists of a genetic algorithm-based framework that solves with little modification tr...
Vitoantonio Bevilacqua, Giuseppe Mastronardi, Gius...