As decisions in cardiology increasingly rely on non-invasive methods, fast and precise image processing tools have become a crucial component of the analysis workflow. To the best ...
Razvan Ioan Ionasec, Ingmar Voigt, Bogdan Georgesc...
Program code in a computer system can be altered either by malicious security attacks or by various faults in microprocessors. At the instruction level, all code modifications are ...
In this manuscript we present the summarization and categorization subsystems of a complete mechanism that begins with web-page fetching and concludes with representation of the c...
Rice Mutant Database (RMD, http://rmd.ncpgr.cn) is an archive for collecting, managing and searching information of the T-DNA insertion mutants generated by an enhancer trap syste...
Abstract. Within OASIS, a set of detailed Use Cases have been developed, after capturing the specific needs of elderly users on the use and acquisition of services for the support ...
Maria Panou, Evangelos Bekiaris, Maria Fernanda Ca...