A distributed data mining algorithm to improve the detection accuracy when classifying malicious or unauthorized network activity is presented. The algorithm is based on genetic p...
Gianluigi Folino, Clara Pizzuti, Giandomenico Spez...
The IETF is currently focused on Differentiated Services (Diffserv) as the architecture to provide Quality of Service in IP networks (IP-QoS). The Diffserv architecture consists o...
Fulu Li, Nabil Seddigh, Biswajit Nandy, Diego Matu...
Background: When proteins are subjected to proteolytic digestion and analyzed by mass spectrometry using a method such as 2D LC MS/MS, only a portion of the proteotypic peptides a...
William S. Sanders, Susan M. Bridges, Fiona M. McC...
The simultaneity matrix is an × matrix of numbers. It is constructed according to a set of -bit solutions. The matrix element mij is the degree of linkage between bit positions i ...
In this paper we propose to use lexical semantic networks to extend the state-of-the-art object recognition techniques. We use the semantics of image labels to integrate prior kno...