Background: Recent, rapid growth in the quantity of available genomic data has generated many protein sequences that are not yet biochemically classified. Thus, the prediction of ...
— This paper is motivated by the real world problem of search and rescue by unmanned aerial vehicles (UAVs). We consider the problem of tracking a static target from a bird’sey...
Andrew Colquhoun Symington, Sonia Waharte, Simon J...
—Studies of attention and working memory address the fundamental limits in our ability to encode and maintain behaviorally relevant information, processes that are critical for g...
Various attacks (e.g., SQL injections) may corrupt data items in the database systems, which decreases the integrity level of the database. Intrusion detections systems are becomi...
Digital watermarking is the enabling technology to prove ownership on copyrighted material, detect originators of illegally made copies, monitor the usage of the copyrighted multi...
Jiang Du, Choong-Hoon Lee, Heung-Kyu Lee, Young-Ho...