Background: Present-day `-omics' technologies produce overwhelming amounts of data which include genome sequences, information on gene expression (transcripts and proteins) a...
Maria Luisa Chiusano, Nunzio D'Agostino, Alessandr...
Domain specific ontologies are heavily used in many applications. For instance, these form the bases on which similarity/dissimilarity between keywords are extracted for various k...
A data model is a plan for building a database and is comparable to an architect's building plans. There are two major methodologies used to create a data model: the EntityRe...
Joanne M. Atlee, Robert B. France, Geri Georg, Ana...
We argue that expert finding is sensitive to multiple document features in an organizational intranet. These document features include multiple levels of associations between expe...
Jianhan Zhu, Xiangji Huang, Dawei Song, Stefan M. ...
Abstract—Belief and vulnerability have been proposed recently to quantify information flow in security systems. Both concepts stand as alternatives to the traditional approaches...