Intrusion detection systems (IDS) are special computer security tools which help detect intrusion attempts. Misuse based detection is one of the techniques which is used by IDS to ...
Md. Ahsan Habib, Krisna Prasad Pawdel, Mohammad Ra...
Background: Transcriptional regulation in eukaryotes often involves multiple transcription factors binding to the same transcription control region, and to understand the regulato...
Derek Y. Chiang, Alan M. Moses, Manolis Kamvysseli...
For face recognition, face feature selection is an important step. Better features should result in better performance. This paper describes a robust face recognition algorithm usi...
Non-rigid object alignment is especially challenging when only a single appearance template is available and target and template images fail to match. Two sources of discrepancy b...
We address two problems of technical authors in structured environments: (1) Structure definitions of the SGML school are limiting: they require one primary hierarchy and do not c...