In this paper we discuss a data mining framework for constructing intrusion detection models. The key ideas are to mine system audit data for consistent and useful patterns of pro...
Abstract. Inconsistent contexts are death-wounds which usually result in contextaware applications' incongruous behaviors and users' perplexed feelings, therefore the ben...
Yingyi Bu, Shaxun Chen, Jun Li, XianPing Tao, Jian...
Magnetic resonance imaging (MRI) of the brain, followed by automated segmentation of the corpus callosum (CC) in midsagittal sections have important applications in both clinical ...
Arvid Lundervold, Torfinn Taxt, Nicolae Duta, Anil...
The method of microtubule tracking and dynamics analysis, presented here, improves upon the current means of manual and automated quantification of microtubule behavior. Key contr...
Motaz A. El Saban, Alphan Altinok, Austin J. Peck,...
Abstract. More and more software systems use a browser as the universal graphical user interface. As a consequence these applications inherit browser navigation as part of their in...
Pieter W. M. Koopman, Rinus Plasmeijer, Peter Acht...