We consider the problem of recovering items matching a partially specified pattern in multidimensional trees (quad trees and k-d trees). We assume the traditional model where the...
Nicolas Broutin, Ralph Neininger, Henning Sulzbach
—Static analysis tools have been widely used to detect potential defects without executing programs. It helps programmers raise the awareness about subtle correctness issues in t...
Background: Gene expression microarray technology permits the analysis of global gene expression profiles. The amount of sample needed limits the use of small excision biopsies an...
Rachel I. M. van Haaften, Blanche Schroen, Ben J. ...
In this study, we explore the nature of team interaction and the role of temporal coordination in asynchronously communicating global virtual project teams (GVPTs). Drawing on Tim...
Anne P. Massey, Mitzi M. Montoya-Weiss, Yu-Ting Ca...
In this paper we discuss a data mining framework for constructing intrusion detection models. The key ideas are to mine system audit data for consistent and useful patterns of pro...