Quantitative PET studies usually require invasive blood sampling from a peripheral artery to obtain an input function for accurate modelling. However, blood sampling is impractica...
Koon-Pong Wong, David Dagan Feng, Steven R. Meikle...
Password policies alone do not stand a chance of securing computer systems which rely on the use of secretbased, password authentication methods. The enforcement of "strong&q...
In this paper, a cluster-based framework is introduced for comparing analysis methods of functional magnetic resonance images (fMRI). In the proposed framework, fMRI data is repla...
Cluster analysis of dialogs with transport directory service allows revealing the typical scenarios of dialogs, which is useful for designing automatic dialog systems. We show how ...
Mikhail Alexandrov, Emilio Sanchis Arnal, Paolo Ro...
Several algorithms based on link analysis have been developed to measure the importance of nodes on a graph such as pages on the World Wide Web. PageRank and HITS are the most pop...