By applying web mining tools, significant patterns about the visitor behavior can be extracted from data originated in web sites. Supported by a domain expert, the patterns are v...
One of the biggest obstacles faced by user command based anomaly detection techniques is the paucity of data. Gathering command data is a slow process often spanning months or yea...
Clinicians cannot easily visualize 3D intracerebral vascular anatomy in adequate detail. We present methods of creating a detailed, 3D vascular map from an MRA and a pair of x-ray ...
Elizabeth Bullitt, Alan Liu, Stephen R. Aylward, S...
It is not uncommon for modern systems to be composed of a variety of interacting services, running across multiple machines in such a way that most developers do not really unders...
This paper discusses the design, development, and use of a performance monitoring tool for Distributed Interactive Simulations (DIS). A typical DIS environment consists of hundred...