Abstract-- In this paper, we address the issue of forecasting for periodically measured nonstationary traffic based on statistical time series modeling. Often with time series base...
Abstract. This study aims to recover transient, trialvarying evoked potentials (EPs), in particular the movement-related potentials (MRPs), embedded within the background cerebral ...
D. D. Ben Dayan Rubin, G. Baselli, Gideon F. Inbar...
Background: The exploitation of information extraction (IE), a technology aiming to provide instances of structured representations from free-form text, has been rapidly growing w...
Tuangthong Wattarujeekrit, Parantu K. Shah, Nigel ...
Intrusion detection is a surveillance problem of practical import that is well suited to wireless sensor networks. In this paper, we study the application of sensor networks to the...
Cryptographic algorithms play a key role in computer security and the formal analysis of their robustness is of utmost importance. Yet, logic and automated reasoning tools are seld...