Information security evaluation of software-intensive systems typically relies heavily on the experience of the security professionals. Obviously, automated approaches are needed ...
As the World Wide Web becomes a large source of digital music, the music recommendation system has got a great demand. There are several music recommendation systems for both comme...
Abstract. To investigate the structure of the genomic interaction network built from yeast gene-expression compendium dataset of hundreds of systematic perturbations, social affili...
Data mining tools generally deal with highly structured and precise data. However, classical methods fail to handle imprecise or uncertain information. This paper proposes a neuro-...
Romeo Mark A. Mateo, Malrey Lee, Su-Chong Joo, Jae...
The purpose of this study is to develop a decision making system to evaluate the risks in E-Commerce (EC) projects. Competitive software businesses have the critical task of assess...
Rashid Hafeez Khokhar, David A. Bell, Jiwen Guan, ...
Abstract. It is difficult to understand a scene from visual information in uncertain real world. Since Bayesian network (BN) is known as good in this uncertainty, it has received s...
This paper argues about the deployment positions of Network-based Intrusion Detection System and suggests the "Distributed Network Security Sensors" distributed among the...
Interval number is a kind of special fuzzy number and the interval approach is a good method to deal with some uncertainty. The semi-absolute deviation risk function is extended to...