— Polymorphic worms can change their byte sequence as they replicate and propagate, thwarting the traditional signature analysis techniques used by many intrusion detection syste...
Initial results of an experiment devised to combine Bond-Graph modeling and simulation with genetic programming for automated design of a simple mechatronic system are reported in...
The aim of the tutorial is to help researchers, particularly early career researchers, to develop the appropriate skills to make a useful research contribution to Human-Computer I...
Anna Louise Cox, Paul A. Cairns, Harold W. Thimble...
Abstract. In this article we propose a cardiac motion estimation technique that uses non-rigid registration to compute the dense cardiac displacement field from 2D ultrasound sequ...
In this paper we investigate how people use online rating information to inform decision making. We examine whether a theory of searching for information to discriminate between a...