Traditional data mining techniques have been extensively applied to find interesting patterns, build descriptive and predictive models from large volumes of data accumulated throug...
Mykola Pechenizkiy, Nikola Trcka, Ekaterina Vasily...
An Intrusion Detection Program (IDP) analyzes what happens or has happened during an execution and tries to find indications that the computer has been misused. In this talk, we p...
In this paper, we introduce a prototype system designed to support mobile group socializing that has been appropriated for everyday use by 150 users over 18 months. The system sup...
Background: Type III secretion system (T3SS) is a specialized protein delivery system in gramnegative bacteria that injects proteins (called effectors) directly into the eukaryoti...
Yang Yang, Jiayuan Zhao, Robyn L. Morgan, Wenbo Ma...
In this paper, we introduce the “Plug” sensor network, a ubiquitous networked sensing platform ideally suited to broad deployment in environments where people work and live. T...
Joshua Lifton, Mark Feldmeier, Yasuhiro Ono, Camer...