There are a variety of well-known models for access control developed for purposes like formally modeling the access rights on files, databases, and web resources. However, the ex...
Carl A. Gunter, Michael J. May, Stuart G. Stubbleb...
Traditional methods for evaluating the amount of anonymity afforded by various Mix configurations have depended on either measuring the size of the set of possible senders of a p...
Richard E. Newman, Vipan R. Nalla, Ira S. Moskowit...
A new imaging approach has been identified and studied in a preliminary way by simulation. The new approach is prompt gamma-ray imaging (PGI) and it is suggested for use on small ...
It has been observed that traditional decision trees produce poor probability estimates. In many applications, however, a probability estimation tree (PET) with accurate probabilit...
In this paper we describe a neural network-based method aimed at automatically calibrating the detector module contained in a scanner for a highresolution positron emission tomogra...
Beatrice Lazzerini, Francesco Marcelloni, Giovanni...