Geographically embedded processes with hidden origins are often observable in events they generate. It is common practice in criminological forensics to reverse simple equation-ba...
Vulnerability discovery rates need to be taken into account for evaluating security risks. Accurate projection of these rates is required to estimate the effort needed to develop ...
We consider the problem of optimizing the parameters of an arbitrary denoising algorithm by minimizing Stein’s Unbiased Risk Estimate (SURE) which provides a means of assessing ...
A significant fraction of Web data is available only for short periods of time. We consider methods to keep track and to record such dynamic information automatically. The main p...
The possible variability of project delay is useful information to understand and mitigate the project delay risk. However, it is not sufficiently considered in the literature con...
Makoto Nonaka, Liming Zhu, Muhammad Ali Babar, Mar...