Image processing techniques and Computer Aided Diagnosis (CAD) systems have proved to be effective for the improvement of radiologists' diagnosis. In this paper an automatic ...
Paola Campadelli, Elena Casiraghi, Giorgio Valenti...
Network intrusion detection systems typically detect worms by examining packet or flow logs for known signatures. Not only does this approach mean worms cannot be detected until ...
In this paper we discuss the application of a new machine learning approach - Argument Based Machine Learning - to the legal domain. An experiment using a dataset which has also be...
Martin Mozina, Jure Zabkar, Trevor J. M. Bench-Cap...
In live-cell fluorescence microscopy imaging, quantitative analysis of biological image data generally involves the detection of many subresolution objects, appearing as diffract...
Ihor Smal, Marco Loog, Wiro J. Niessen, Erik H. W....
Abstract. This paper proposes new cognitive algorithms and mechanisms for detecting 0day attacks targeting the Internet and its communication performances and behavior. For this pu...