While a typical software component has a clearly specified (static) interface in terms of the methods and the input/output types they support, information about the correct sequen...
Standard hidden Markov models (HMM's) have been studied extensively in the last two decades. It is well known that these models assume state conditional independence of the ob...
There is a growing demand for network devices capable of examining the content of data packets in order to improve network security and provide application-specific services. Most...
The task in the computer security domain of anomaly detection is to characterize the behaviors of a computer user (the `valid', or `normal' user) so that unusual occurre...
In addition to its technical merits as a challenging non-rigid motion and structural integrity analysis problem, quantitative estimation of cardiac regional functions and material...