Can we trust without any reliable truth information? Most trust architectures work in a similar way: a trustor makes some observations, rates the trustee, and makes recommendations...
The present study examines the relative importance of a series of known and expected factors that highly affect threat detection performance in aviation security X-ray screening. E...
Anton Bolfing, Tobias Halbherr, Adrian Schwaninger
Based on microarray gene expression datasets, many statistical methods have been proposed to locate the significant differentially expressed genes (marker genes) among different sa...
Atiq Islam, Khan M. Iftekharuddin, David J. Russom...
The novel context of accessing and querying large data repositories through ontologies that are formalized in terms of expressive DLs requires on the one hand to consider query an...
Business Processes for Web Services (BPEL4WS) are the new paradigms for lightweight enterprise integration. They cross organizational boundaries and are provided by entities that s...