The fast growing complexity and short time-tomarket of embedded systems designs, besides the great increase in capacity of today’s chips, are mobilizing the industry towards to ...
The proliferation of malware has presented a serious threat to the security of computer systems. Traditional signature-based antivirus systems fail to detect polymorphic and new, ...
We present a case study about the application of the inductive database approach to the analysis of Web logs. We consider rich XML Web logs ? called conceptual logs ? that are gen...
Rosa Meo, Pier Luca Lanzi, Maristella Matera, Robe...
Ontologies play an important role in the Semantic Web as well as in digital library and knowledge portal applications. This project seeks to develop an automatic method to enrich e...
Chew-Hung Lee, Jin-Cheon Na, Christopher S. G. Kho...
Background: Diagnosis techniques using urine are non-invasive, inexpensive, and easy to perform in clinical settings. The metabolites in urine, as the end products of cellular pro...
Younghoon Kim, Imhoi Koo, Byung Hwa Jung, Bong Chu...