Efforts toward automated detection and identification of multistep cyber attack scenarios would benefit significantly from a methodology and language for modeling such scenario...
Previous workflow mining works have concentrated their efforts on process behavioral aspects. Although powerful, these proposals are found lacking in functionalities and performanc...
In this paper, we propose a method for determining the vignetting function given only a single image. Our method is designed to handle both textured and untextured regions in orde...
Data mining, with its promise to extract valuable, previously unknown and potentially useful patterns or knowledge from large data sets that contain private information is vulnerab...
Abstract. One of the most interesting challenges in Knowledge Discovery in Databases (KDD) eld is giving support to users in the composition of tools for forming a valid and useful...