Security analysis should take advantage of a reliable knowledge base that contains semantically-rich information about a protected network. This knowledge is provided by network m...
Giovanni Vigna, Fredrik Valeur, Jingyu Zhou, Richa...
Despite extensive theoretical work carried out on coordination during the last three decades, much research is still devoted to proving the merits of one model over another. In ou...
Background: One of the most time-consuming tasks after performing a gene expression experiment is the biological interpretation of the results by identifying physiologically impor...
Background: To interpret microarray experiments, several ontological analysis tools have been developed. However, current tools are limited to specific organisms. Results: We deve...
Abstract. We report our work towards building user models of learner’s development based upon evidence of their interactions with an e-learning website composed of multimedia lea...