The rapid propagation of the Internet and information technologies has changed the nature of many industries. Fast response and personalized recommendations have become natural tr...
Operating systems are complex and their behavior depends on many factors. Source code, if available, does not directly help one to understand the OS's behavior, as the behavi...
Nikolai Joukov, Avishay Traeger, Rakesh Iyer, Char...
In microarray gene expression data, clusters may hide in subspaces. Traditional clustering algorithms that make use of similarity measurements in the full input space may fail to ...
Kevin Y. Yip, David W. Cheung, Michael K. Ng, Kei-...
This paper presents our experience applying web services and active database technology in an automotive scenario. Particularly, we concentrate on developing an infrastructure for...
Identifying groups of Internet hosts with a similar behavior is very useful for many applications of Internet security control, such as DDoS defense, worm and virus detection, dete...