There is often the need to update an installed Intrusion Detection System (IDS) due to new attack methods or upgraded computing environments. Since many current IDSs are construct...
High potential variation in prior knowledge, metacognitive skills, and motivation within learner populations can prompt design strategies that combine explicit structuring and scaf...
In this paper, we propose a parallel algorithm for mining maximal frequent itemsets from databases. A frequent itemset is maximal if none of its supersets is frequent. The new par...
This paper describes a method for definition question answering based on the use of surface text patterns. The method is specially suited to answer questions about person's po...
Information integration is often faced with the problem that different data sources represent the same set of the real-world objects, but give conflicting values for specific prop...