There is often the need to update an installed Intrusion Detection System (IDS) due to new attack methods or upgraded computing environments. Since many current IDSs are construct...
Mining frequent patterns is a major topic in data mining research, resulting in many seminal papers and algorithms on item set and episode discovery. The combination of these, call...
New technologies have enabled students to become active participants in computational simulations of dynamic and complex systems (called Participatory Simulations), providing a &q...
Kylie A. Peppler, Joshua A. Danish, Benjamin Zaitl...
Abstract--Business activity monitoring enables continuous observation of key performance indicators (KPIs). However, if things go wrong, a deeper analysis of process performance be...
Branimir Wetzstein, Philipp Leitner, Florian Rosen...
Abstract. The libre software development model has shown how combining collective intelligence can lead to revolutionary methods that underpin major software advancements. This pap...