Process mining has proven to be a valuable tool for analyzing operational process executions based on event logs. Existing techniques perform well on structured processes, but stil...
Recommendation systems have become very popular but most recommendation methods are `hard-wired' into the system making experimentation with and implementation of new recomme...
Georgia Koutrika, Benjamin Bercovitz, Hector Garci...
Current Intrusion Detection Systems (IDS) examine all data features to detect intrusion or misuse patterns. Some of the features may be redundant or contribute little (if anything)...
— High-order human cognition involves processing of abstract and categorically represented knowledge. Traditionally, it has been considered that there is a single innate internal...
Modeling and simulation frameworks for use in different application domains, throughout the complete development process, and in different hardware environments need to be highly ...
Jan Himmelspach, Roland Ewald, Adelinde M. Uhrmach...