"I wrote the first edition this book with the goal of identifying synchronization
idioms and patterns that could be understood in isolation and then assembled
to solve compl...
Most security protocols share a similar set of algorithms and functions and exhibit common sequences and patterns in the way they operate. These observations led us to propose a u...
Previous work on mining transactional database has focused primarily on mining frequent itemsets, association rules, and sequential patterns. However, interesting relationships be...
Quantitative analysis of the swimming motions of C. elegans worms are of critical importance for many gene-related studies on aging. However no automated methods are currently in u...
Abstract—This paper elaborates on mechanisms for establishing visual joint attention for the design of robotic agents that learn through natural interfaces, following a developme...