We propose a data warehousing architecture for effective risk analysis in a banking scenario. The core of the architecture consists in two data mining tools for improving the qual...
Gianni Costa, Francesco Folino, Antonio Locane, Gi...
Many DSP algorithms are very computationally intensive. They are typically implemented using an ensemble of processing elements (PEs) operating in parallel. The results from PEs n...
Reverse engineering legacy software systems often involves the employment of clustering algorithms that automatically decompose a software system into subsystems. The decompositio...
Abstract. In this paper we present a new, non-pheromone-based algorithm inspired by the behaviour of biological bees. The algorithm combines both recruitment and navigation strateg...
Nyree Lemmens, Steven de Jong, Karl Tuyls, Ann Now...
Abstract. In this paper we present a model of facial behaviour encompassing interpersonal relations for an Embodied Conversational Agent (ECA). Although previous solutions of this ...