Abstract. There are a number of attacker models in the area of anonymous communication. Most of them are either very simplified or pretty abstract - therefore difficult to generali...
Usability is the weakest link in the security chain of many prominent applications. A set of security usability principles should therefore be considered when designing and engine...
This paper investigates the effects of demand risk on the performance of supply chain in continuous time setting. The inventory level has been modeled as a jump-diffusion process ...
: For microarray based cancer classification, feature selection is a common method for improving classifier generalisation. Most wrapper methods use cross validation methods to eva...
Nonlinear classifiers, e.g., support vector machines (SVMs) with radial basis function (RBF) kernels, have been used widely for automatic diagnosis of diseases because of their hig...
Baek Hwan Cho, Hwanjo Yu, Jong Shill Lee, Young Jo...