Abstract This paper presents a type-based analysis for inferring sizeand cost-equations for recursive, higher-order and polymorphic functional programs without requiring user annot...
The paper presents MRNet, an original method for inferring genetic networks from microarray data. This method is based on maximum relevance/minimum redundancy (MRMR), an effective ...
Patrick Emmanuel Meyer, Kevin Kontos, Gianluca Bon...
Intrusion detection in computer networks faces the problem of a large number of both false alarms and unrecognized attacks. To improve the precision of detection, various machine l...
The Dual Smart Drive is a specially designed nonlinear actuator intended for use in climbing and walking legged robots. It features a continuously changing transmission ratio and d...
Abstract-- Privacy preservation in data mining demands protecting both input and output privacy. The former refers to sanitizing the raw data itself before performing mining. The l...