Software maintenance and evolution are inevitable activities since almost all software that is useful and successful stimulates user-generated requests for change and improvements...
—Evaluation of network security is an essential step in securing any network. This evaluation can help security professionals in making optimal decisions about how to design secu...
For types of data visualization where the cost of producing images is high, and the relationship between the rendering parameters and the image produced is less than obvious, a vi...
We introduce a novel approach to expert finding based on multi-step relevance propagation from documents to related candidates. Relevance propagation is modeled with an absorbing ...
We present a new method for reconstructing digitally recorded off-axis Fresnel holograms. Currently-used reconstruction methods are based on the simulation and propagation of a re...
Michael Liebling, Thierry Blu, Etienne Cuche, Pier...