We describe a data mining system to detect frauds that are camouflaged to look like normal activities in domains with high number of known relationships. Examples include accounti...
Per-flow congestion control helps endpoints fairly and efficiently share network resources. Better utilization of network resources can be achieved, however, if congestion manag...
Min Sik Kim, Taekhyun Kim, YongJune Shin, Simon S....
Table is a commonly used presentation scheme, especially for describing relational information. However, table understanding remains an open problem. In this paper, we consider th...
Information empowers those who make sense from its successful interpretation; this is especially true on the subject of weather where the recipient is required to have prior forms...
Raymond Koon Chuan Koh, Henry Xin Liong Tan, Henry...
Effective diagnosis of Alzheimer's disease (AD) is of primary importance in biomedical research. Recent studies have demonstrated that neuroimaging parameters are sensitive a...
Jieping Ye, Kewei Chen, Teresa Wu, Jing Li, Zheng ...