Modern distributed information retrieval techniques require accurate knowledge of collection size. In non-cooperative environments, where detailed collection statistics are not av...
Malware such as Trojan Horses and spyware remain to be persistent security threats that exploit the overly complex graphical user interfaces of today’s commodity operating syste...
Large amounts of protein-protein interaction data have been identified using various genome-scale screening techniques. Although interaction data is a valuable resource, high-thro...
Single-particle tracking provides a powerful technique for measuring dynamic cellular processes on the level of individual molecules. Much recent work has been devoted to using si...
The problem of record linkage focuses on determining whether two object descriptions refer to the same underlying entity. Addressing this problem effectively has many practical ap...