Verified and validated security policies are essential components of high assurance computer systems. The design and implementation of security policies are fundamental processes i...
Luay A. Wahsheh, Daniel Conte de Leon, Jim Alves-F...
Abstract. In this paper we present a novel approach to visualize irregularly occurring events. We introduce the event line view designed specifically for such events data (a subset...
Kresimir Matkovic, Alan Lez, Denis Gracanin, Andre...
Image representation has been a key issue in vision research for many years. In order to represent various local image patterns or objects effectively, it is important to study th...
Jun Miao, Lijuan Duan, Laiyun Qing, Wen Gao, Xilin...
Modeling is a complex and central activity in many domains. Domain experts and designers usually work by drawing and create models from the middle-out; however, visual and middle-...
Background: The accurate determination of orthology and inparalogy relationships is essential for comparative sequence analysis, functional gene annotation and evolutionary studie...
Benjamin Linard, Julie D. Thompson, Olivier Poch, ...