This paper combines an analysis of data on security vulnerabilities (published in Bugtraq database) and a focused source-code examination to develop a finite state machine (FSM) m...
Shuo Chen, Zbigniew Kalbarczyk, Jun Xu, Ravishanka...
The ability to locate promoters within a section of DNA is known to be a very difficult and very important task in DNA analysis. We document an approach that incorporates the conce...
Philip Uren, R. Mike Cameron-Jones, Arthur H. J. S...
Abstract. Interaction increases flexibility of segmentation but it leads to undesirable behaviour of an algorithm if knowledge being requested is inappropriate. In region growing, ...
In this paper, we describe lexical rule-based approach to affect sensing from text, and application of the developed Affect Analysis Model in 3D virtual world Second Life. To enric...
Alena Neviarouskaya, Helmut Prendinger, Mitsuru Is...
The increasing complexity of modern Information Services (IS) makes necessary to carry on review activities. For many companies, these reviews take place within the framework of t...
Jacques Simonin, Yves Le Traon, Jean-Marc Jé...