Abstract. This paper presents a tract-oriented analysis of diffusion tensor (DT) images of the human brain. We demonstrate that unlike the commonly used ROI-based methods for popul...
Mahnaz Maddah, Marek Kubicki, William M. Wells I...
Attackers often take advantage of vulnerabilities in benign software, and the authors of benign software must search their code for bugs in hopes of finding vulnerabilities before...
Juan Caballero, Pongsin Poosankam, Stephen McCaman...
Following advances in biotechnology, many new whole genome sequences are becoming available every year. A lot of useful information can be derived from the alignment and compariso...
In spite of decades of research on word sense disambiguation (WSD), all-words general purpose WSD has remained a distant goal. Many supervised WSD systems have been built, but the...
Mitesh M. Khapra, Anup Kulkarni, Saurabh Sohoney, ...
Existing graph mining algorithms typically assume that databases are relatively static and can fit into the main memory. Mining of subgraphs in a dynamic environment is currently ...