Due to the dramatic increase in intrusive activities architecture security analysis and design has emerged as an important aspect of the development of software services. It is a ...
This paper presents a strategy, based on requirement patterns (RP), aimed at improving the requirement analysis discipline by allowing business analysts (BA) to produce more relia...
Luca Vetti Tagliati, Roger Johnson, George Roussos
Multiuser collusion is an effective attack against traitor-tracing multimedia fingerprinting, where a group of attackers collectively mount attacks to reduce their risk of being d...
This pilot study was carried out to find the feasibility of analyzing the maturity of the fetal lung using ultrasound images. Data were collected from normal pregnant women at inte...
K. N. Bhanu Prakash, A. G. Ramakrishnan, S. Suresh...
In this paper, it is shown how to extract a hypothesis with small risk from the ensemble of hypotheses generated by an arbitrary on-line learning algorithm run on an independent an...