Recently, a variety of workflow patterns has been proposed focusing on specific aspects like control flow, data flow, and resource assignments. Though these patterns are relevant f...
Misuse Detection systems identify evidence of attacks by searching for patterns of known attacks (signatures). A main problem in this context is the modeling and specification of a...
In this paper, we present a novel active contour model, in which the traditional gradient descent optimization is replaced by graph cut optimization. The basic idea is to first de...
Hang Chang, Qing Yang, Manfred Auer, Bahram Parvin
Abstract— Continuum robots made from telescoping precurved elastic tubes enable base-mounted actuators to specify the curved shapes of robots as thin as standard surgical needles...
D. Caleb Rucker, Bryan A. Jones, Robert J. Webster...
: During software development projects there is always a particular working “product” that is generated but rarely managed: the knowledge and experience that team members acqui...