Identifying the intentions or attempts of the monitored agents through observations is very vital in computer network security. In this paper, a plan recognition method for predict...
Li Feng, Xiaohong Guan, Sangang Guo, Yan Gao, Pein...
s text mining techniques over Medline abstracts as a method for accessing both these bodies of evidence in a consistent way. In an example use case, we apply our method to create a...
Abstract. Probabilistic tractography provides estimates of the probability of a structural connection between points or regions in a brain volume, based on information from diffusi...
Jonathan D. Clayden, Martin D. King, Chris A. Cl...
Screening mammography represents the technique adopted to detect breast cancer at an early stage. However the presence of artifacts and pectoral muscle can disturb the detection o...
Ali Cherif Chaabani, Atef Boujelben, Adel Mahfoudh...
Automating the process of postmortem identification of deceased individuals based on dental characteristics is receiving increased attention. With the large number of victims enco...