This paper evaluates pointer tainting, an incarnation of Dynamic Information Flow Tracking (DIFT), which has recently become an important technique in system security. Pointer tai...
Reuse of ontologies is important for achieving better interoperability among health systems and relieving knowledge engineers from the burden of developing ontologies from scratch...
Kaustubh Supekar, Daniel L. Rubin, Natasha F. Noy,...
Continuous and reliable operation of WSNs is notoriously difficult to guarantee due to hardware degradation and environmental changes. In this paper, we propose and demonstrate a ...
Various methods have recently appeared to transform foreign-accented speech into its native-accented counterpart. Evaluation of these accent conversion methods requires extensive l...
Ultrasonography is an invaluable and widely used medical imaging tool.
Nevertheless, automatic texture analysis on ultrasound images remains a challenging
issue. This work presen...
Stamos Katsigiannis, Eystratios G. Keramidas, Dimi...