The termination insensitive secure information flow problem can be reduced to solving a safety problem via a simple program transformation. Barthe, D’Argenio, and Rezk coined th...
A method is presented for segmentation of anatomical structures that incorporates prior information about shape. The method iteratively applies steps which find object’s border ...
Like others in the field, technology service providers in the Indiana University (IU) School of Education face many demands despite limited resources. In Education Technology Serv...
In the conventional Peer-to-Peer (P2P) networks, many research projects or practical applications still use the keyword-based retrieval methods in the information searching compon...
The current methods of publishing chemical information in bioscience articles are analysed. Using 3 papers as use-cases, it is shown that conventional methods using human procedur...
Peter Murray-Rust, John B. O. Mitchell, Henry S. R...