To ameliorate the quality of protection provided by intrusion detection systems (IDS) we strongly need more effective evaluation and testing procedures. Evaluating an IDS against ...
Mohammed S. Gadelrab, Anas Abou El Kalam, Yves Des...
Background: The information from different data sets experimented under different conditions may be inconsistent even though they are performed with the same research objectives. ...
Ki-Yeol Kim, Dong Hyuk Ki, Hei-Cheul Jeung, Hyun C...
One of the important components of a local search strategy for satisfiability testing is the variable selection heuristic, which determines the next variable to be flipped. In a...
Temporal planning (TP) is notoriously difficult because it requires to solve a propositional STRIPS planning problem with temporal constraints. In this paper, we propose an efficie...
Background: In the last decades, microarray technology has spread, leading to a dramatic increase of publicly available datasets. The first statistical tools developed were focuse...
Paolo G. V. Martini, Davide Risso, Gabriele Sales,...