Users of traditional tutorials and help systems often have difficulty finding the components described or pictured in the procedural instructions. Users also unintentionally miss ...
By exploiting the object-oriented dynamic composability of modern document applications and formats, malcode hidden in otherwise inconspicuous documents can reach third-party appli...
Wei-Jen Li, Salvatore J. Stolfo, Angelos Stavrou, ...
We present a new approach to large-scale graph mining based on so-called backbone refinement classes. The method efficiently mines tree-shaped subgraph descriptors under minimum f...
The Infrastructure of modern society is controlled by software systems that are vulnerable to attacks. Many such attacks, launched by "recreational hackers" have already...
Howard E. Shrobe, Robert Laddaga, Robert Balzer, N...
Building of atlases representing average and variability of a population of images or of segmented objects is a key topic in application areas like brain mapping, deformable objec...
Shun Xu, Martin Andreas Styner, Brad Davis, Sarang...