Mars probes send back to Earth enormous amount of data. Automating the analysis of this data and its interpretation represents a challenging test of significant benefit to the doma...
Tomasz F. Stepinski, Soumya Ghosh, Ricardo Vilalta
Phishing is an increasingly sophisticated method to steal personal user information using sites that pretend to be legitimate. In this paper, we take the following steps to identif...
Automated computer classification (ACC) techniques are needed to facilitate physician's diagnosis of complex diseases in individual patients. We provide an example of ACC usin...
Simon Duchesne, A. Caroli, C. Geroldi, Christian B...
Abstract. Four-dimensional respiratory correlated computed tomography (4D RCCT) has been widely used for studying organ motion. Most current algorithms use binning techniques which...
Jacob Hinkle, P. Thomas Fletcher, Brian Wang, Bill...
The utility of simulations and analysis heavily relies on good models of network traffic. While network traffic constantly changing over time, existing approaches typically take y...