Anomaly detection systems largely depend on user profile data to be able to detect deviation from normal activity. Most of this profile data is based on commands executed by use...
Prediction of protein tertiary structure based on amino acid sequence is one of the most challenging open questions in computational molecular biology. The two most common experim...
Paul E. Anderson, Douglas W. Raiford, Deacon J. Sw...
Service Level Agreements (SLAs) define the level of service that a service provider must deliver. An SLA is a contract between service provider and consumer, and includes appropri...
Tony Chau, Vinod Muthusamy, Hans-Arno Jacobsen, El...
The wide diffusion of new technologies in communication and business has changed how consumer and product/store knowledge has to be managed and represented digitally. This issue h...
Pierpaolo Singer, Maria Antonella Ferri, Lucia Aie...
We investigate coding techniques to reduce the energy consumed by on-chip buses in a microprocessor. We explore several simple coding schemes and simulate them using a modified Si...
Victor Wen, Mark Whitney, Yatish Patel, John Kubia...