Keeping people away from litigious information becomes one of the most important research area in network information security. Indeed, Web filtering is used to prevent access to u...
Scientific workflows have gained great momentum in recent years due to their critical roles in e-Science and cyberinfrastructure applications. However, some tasks of a scientific w...
Liqiang Wang, Shiyong Lu, Xubo Fei, Jeffrey L. Ram
The clustering coefficient C of a network, which is a measure of direct connectivity between neighbors of the various nodes, ranges from 0 (for no connectivity) to 1 (for full conn...
This paper proposes an unusual event recognition algorithm, which is a part of a mobile alarm system. Our systems focus on unusual event. When the system detects the unusual event,...
Soo Yeong Kwak, Guntae Bae, Kil-Cheon Kim, Hyeran ...
We present a case study to demonstrate the possibility of discovering complex and interesting latent structures using hierarchical latent class (HLC) models. A similar effort was m...
A new approach is proposed to generate workflow scenarios of scientific applications such as Molecular Dynamics and Monte-Carlo simulations in a distributed environment. The approa...
In this paper, we propose an efficient measurement of the eye blinking for drowsy driver detection system that is one of the driver safety systems for the intelligent vehicle. Howe...