In this paper, we propose spam e-mail filtering methods having high accuracies and low time complexities. The methods are based on the n-gram approach and a heuristics which is re...
For the planning of surgical interventions of the spine exact knowledge about 3D shape and the local bone quality of vertebrae are of great importance in order to estimate the anch...
Capability acquisition graphs (CAGs) provide a powerful framework for modeling insider threats, network attacks and system vulnerabilities. However, CAG-based security modeling sys...
Duc T. Ha, Shambhu J. Upadhyaya, Hung Q. Ngo, S. P...
We present a novel approach for building verb subcategorization lexicons using a simple graphical model. In contrast to previous methods, we show how the model can be trained with...
Thomas Lippincott, Anna Korhonen, Diarmuid Ó...
Abstract. From the echoes of their vocalisations bats extract information about the positions of reflectors. To gain an understanding of how target position is translated into neu...
Bertrand Fontaine, Herbert Peremans, Benjamin Schr...