Multi-slice Computer Tomography (CT) scans are widely used in today's diagnosis of head traumas. It is effective to disclose the bleeding and fractures. In this paper, we pre...
Boon Chuan Pang, C. C. Tchoyoson Lim, Cheng Kiang ...
Many methods have been developed for monitoring network traffic, both using visualization and statistics. Most of these methods focus on the detection of suspicious or malicious ...
Stealth malware programs that silently infect enterprise and consumer machines are becoming a major threat to the future of the Internet [XZ04]. Resource hiding is a powerful stea...
Background: Non-coding RNAs gain more attention as their diverse roles in many cellular processes are discovered. At the same time, the need for efficient computational prediction...
Peter Raasch, Ulf Schmitz, Nadja Patenge, Julio Ve...
Recently developed video editing techniques have enabled us to create realistic synthesized videos. Therefore, using video data as evidence in places such as courts of law requires...