Privacy and security has been considered as the top criterion for the acceptance of e-service adoption. In this paper, we proposed a privacy aware identity protection design that i...
In this paper, we proposed an IP Local Link-Protection (IPLLP) scheme based on the characteristic of shortest-path routing in IP networks. Our scheme working in an intra-area routi...
In this multi-university collaborative research, we will develop a framework for the dynamic data-driven fault diagnosis of wind turbines which aims at making the wind energy a com...
Yu Ding, Eunshin Byon, Chiwoo Park, Jiong Tang, Yi...
Traditional association rules mining (ARM) only concerns the frequency of itemsets, which may not bring large amount of profit. Utility mining only focuses on itemsets with high ut...
Jing Wang, Ying Liu, Lin Zhou, Yong Shi, Xingquan ...
A model of computation (MoC) is a formal abstraction of execution in a computer. There is a need for composing MoCs in e-science. Kepler, which is based on Ptolemy II, is a scienti...
Antoon Goderis, Christopher Brooks, Ilkay Altintas...