—This paper explores the idea of knowledge-based security policies, which are used to decide whether to answer queries over secret data based on an estimation of the querier’s ...
Piotr Mardziel, Stephen Magill, Michael Hicks, Mud...
In this paper we present the application of the inductive database approach to two practical analytical case studies: Web usage mining in Web logs and financial data. As far as co...
Rosa Meo, Pier Luca Lanzi, Maristella Matera, Dani...
Abstract. We show that a simple probabilistic modelling of the registration problem for surfaces allows to solve it by using standard clustering techniques. In this framework, poin...
An algorithm for improved automatic segmentation of gross anatomical structures of the human brain is presented that merges the output of a tissue classification process with gross...
D. Louis Collins, Alex P. Zijdenbos, Wim F. C. Baa...
Abstract— This paper describes a probabilistic bail-out condition for multihypothesis testing based on Bennett’s inequality. We investigate the use of the test for increasing t...