: The fact that security is a critical problem when implementing mobile ad hoc networks (MANETs) is widely acknowledged. One of the different kinds of misbehavior a node may exhibi...
Frank Kargl, Andreas Klenk, Michael Weber, Stefan ...
Background: Associating literature with pathways poses new challenges to the Text Mining (TM) community. There are three main challenges to this task: (1) the identification of th...
Kanae Oda, Jin-Dong Kim, Tomoko Ohta, Daisuke Okan...
Background: The relationship between disease susceptibility and genetic variation is complex, and many different types of data are relevant. We describe a web resource and databas...
The goal is to monitor multiple numerical streams, and determine which pairs are correlated with lags, as well as the value of each such lag. Lag correlations (and anticorrelation...
—The hidden knowledge in social networks data can be regarded as an important resource for criminal investigations which can help finding the structure and organization of a crim...