Worms, viruses, and other malware can be ticking bombs counting down to a specific time, when they might, for example, delete files or download new instructions from a public we...
Jedidiah R. Crandall, Gary Wassermann, Daniela A. ...
We show that the e-commerce domain can provide all the right ingredients for successful data mining. We describe an integrated architecture for supporting this integration. The ar...
Suhail Ansari, Ron Kohavi, Llew Mason, Zijian Zhen...
Wireless sensor networks (WSNs) represent a typical domain where there are complex temporal sequences of events. In this paper we propose a relational framework to model and analys...
Teresa Maria Altomare Basile, Nicola Di Mauro, Ste...
: Online meetings are increasingly popular in support of technology-enhanced learning collaboration. When these virtual meetings are recorded and shared in the host community and b...
Peter J. Scott, Linda J. Castaneda, Kevin Quick, J...
Background: High-throughput re-sequencing, new genotyping technologies and the availability of reference genomes allow the extensive characterization of Single Nucleotide Polymorp...