Introducing a new device to a network or to another device is one of the most security critical phases of communication in personal networks. There have been several different pro...
Discovering associations between elements occurring in a stream is applicable in numerous applications, including predictive caching and fraud detection. These applications requir...
Many approaches have emerged in the attempt to explain the memory process. One of which is the Theory of Neuronal Group Selection (TNGS), proposed by Edelman [1]. In the present wo...
Abstract. In this work, we propose two approaches of hiding predictive association rules where the data sets are horizontally distributed and owned by collaborative but non-trustin...
Objective: To introduce the availability of grant-to-article linkage data associated with NIH grants and to perform a high-level analysis of the publication outputs and impacts as...