Abstract. We present a method that improves the results of network intrusion detection by integration of several anomaly detection algorithms through trust and reputation models. O...
This paper describes the research and development of a methodology to identify the type of information required by the service advisor (CSA) within customer contact centre (CCC) e...
S. Shah, Rajkumar Roy, Ashutosh Tiwari, Basim Maje...
Creating and editing graphs and node-link diagrams by means of digital tools are crucial activities in domains such as software or business process modeling. However, these tools h...
123456 The increasing amount of freely available healthrelated web content generates, on one hand, excellent conditions for self-education of patients as well as physicians, but on...
Nowadays, searching information in the web or in any kind of document collection has become one of the most frequent activities. However, user queries can be formulated in a way th...