Safety and security guarantees for individual applications in general depend on assumptions on the given context provided by distributed instances of operating systems, hardware pl...
Bruno Langenstein, Andreas Nonnengart, Georg Rock,...
Performing a good security analysis on the design of a system is an essential step in order to guarantee a reasonable level of protection. However, different attacks and threats m...
Case-based reasoning is a flexible methodology to manage software development related tasks. However, when the reasoner’s task is prediction, there are a number of different CBR ...
Rosina Weber, Michael Waller, June M. Verner, Will...
The construction of computational cognitive models integrating the connectionist and symbolic paradigms of artificial intelligence is a standing research issue in the field. The co...
The estimation of soft tissue deformation from 3D image sequences is an important problem in a number of fields such as diagnosis of heart disease and image guided surgery. In thi...
Xenophon Papademetris, Pengcheng Shi, Donald P. Di...