Background: In recent years, substantial effort has been applied to de novo regulatory motif discovery. At this time, more than 150 software tools exist to detect regulatory bindi...
Daniel Quest, Kathryn Dempsey, Mohammad Shafiullah...
In many business applications, large data workloads such as sales figures or process performance measures need to be monitored in real-time. The data analysts want to catch proble...
Ming C. Hao, Daniel A. Keim, Umeshwar Dayal, Danie...
We propose a new technique for quad-dominant remeshing which separates the local regularity requirements from the global alignment requirements by working in two steps. In the fir...
Tracing IP packets to their sources, known as IP traceback, is an important task in defending against IP spoofing and DoS attacks. Log-based IP traceback technique is to log pack...
Hands-free devices are often used in a noisy and reverberant environment. Therefore, the received microphone signal does not only contain the desired near-end speech signal but als...
Emanuel A. P. Habets, Sharon Gannot, Israel Cohen,...