Today’s signature-based intrusion detection systems are reactive in nature and storage-limited. Their operation depends upon catching an instance of an intrusion or virus and en...
Charles R. Haag, Gary B. Lamont, Paul D. Williams,...
Tree mining consists in discovering the frequent subtrees from a forest of trees. This problem has many application areas. For instance, a huge volume of data available from the In...
This work proposes a framework for the design and development of Ontology Agents oriented to manage Rule Base Fuzzy Cognitive Maps (RBFCM). The approach takes into account the foun...
Abstract. Governments often hold very rich data and whilst much of this information is published and available for re-use by others, it is often trapped by poor data structures, lo...
Harith Alani, David Dupplaw, John Sheridan, Kieron...
Towards a sustainable society, design of artifacts must be optimized with limited resources on the earth while keeping our life. In order to realize it, I emphasize openness of des...