A common teaching and learning methodology involves one that delivers knowledge to learners within a classroom environment. With the enhancement of information technology, Web-bas...
Abstract. Query expansion has received extensive attention in information retrieval community. Although semantic based query expansion appears to be promising in improving retrieva...
Mining frequent patterns in transaction databases has been studied extensively in data mining research. However, most of the existing frequent pattern mining algorithms do not con...
This paper proposes to use cognitive multi-agent based simulation to facilitate human team formation decision processes. The models of organizational actors are acquired by a data...
Intrusion Detection Systems (IDSs) have become an important part of operational computer security. They are the last line of defense against malicious hackers and help detect ongo...