Peer-to-Peer systems have proven to be an effective way of sharing data. Modern protocols are able to efficiently route a message to a given peer. However, determining the destin...
Background: The secondary structure of an RNA must be known before the relationship between its structure and function can be determined. One way to predict the secondary structur...
We present and empirically analyze a machine-learning approach for detecting intrusions on individual computers. Our Winnowbased algorithm continually monitors user and system beh...
We present a learning framework for structured support vector models in which boosting and bagging methods are used to construct ensemble models. We also propose a selection metho...
In this paper, we propose a novel approach to automatic generation of aspect-oriented summaries from multiple documents. We first develop an event-aspect LDA model to cluster sen...