Nowadays, graph-based knowledge discovery algorithms do not consider numeric attributes (they are discarded in the preprocessing step, or they are treated as alphanumeric values w...
Oscar E. Romero, Jesus A. Gonzalez, Lawrence B. Ho...
Positional ranking functions, widely used in web search engines, improve result quality by exploiting the positions of the query terms within documents. However, it is well known ...
Spyware is a class of malicious code that is surreptitiously installed on victims’ machines. Once active, it silently monitors the behavior of users, records their web surfing ...
Manuel Egele, Christopher Kruegel, Engin Kirda, He...
Resource allocation is a key problem in autonomic computing. In this paper we use a data center scenario to motivate the need for decentralization and cooperative negotiation, and...
Craig Boutilier, Rajarshi Das, Jeffrey O. Kephart,...
—Rain and snow can have a distorting effect on Ku and Ka bands signal fidelity resulting in excessive digital transmission errors. This loss of signal attenuation is commonly ref...
Kamal Harb, Anand Srinivasan, Changcheng Huang, Br...