This paper investigates the feasibility of using diffusion MRI to measure axon-cell dimensions in the white matter of live subjects. A simple geometric model of white-matter tissu...
Semantic event recognition based only on vision cues has had limited success on unconstrained still pictures. Metadata related to picture taking provides contextual cues independe...
The emerging cyberinfrastructure holds the promise to provide on-demand access to high performance network resources, computing resources, and data storage/retrieval resources fro...
Tharaka Devadithya, Kim Baldridge, Adam Birnbaum, ...
The man-in-the-middle (MITM) attack has been shown to be one of the most serious threats to the security and trust of existing VoIP protocols and systems. For example, the MITM wh...
Ruishan Zhang, Xinyuan Wang, Ryan Farley, Xiaohui ...
This paper introduces two complexity-theoretic formulations of Bennett’s computational depth: finite-state depth and polynomial-time depth. It is shown that for both formulation...