The task in the computer security domain of anomaly detection is to characterize the behaviors of a computer user (the `valid', or `normal' user) so that unusual occurre...
This paper explores the role of data analysis methods to support system-level designers in characterising the performance of embedded applications. In particular, we address the p...
This paper describes the system architecture development process in an international ICT company, which is building a comprehensive e-business system for its customers. The implem...
We define sporadic rules as those with low support but high confidence: for example, a rare association of two symptoms indicating a rare disease. To find such rules using the w...
There is a need to develop methods to automatically incorporate prior knowledge to support the prediction and validation of novel functional associations. One such important sourc...
Francisco Azuaje, Haiying Wang, Huiru Zheng, Olivi...