The segmentation and analysis of blood vessels has received much attention in the research community. The results aid numerous applications for diagnosis and treatment of vascular...
—Most existing wireless ad hoc routing protocols rely upon the use of backward learning technique with explicit control messages to route packets. In this paper we propose a set ...
With the recent rapid increase in interactive web applications that employ back-end database services, an SQL injection attack has become one of the most serious security threats....
Our major effort in this reporting period comprised functional genomic studies of key genes for carbon metabolite and nodulation/nitrogen fixation in Sinorhizobium meliloti, compar...
In this article we review standard null-move pruning and introduce our extended version of it, which we call verified null-move pruning. In verified null-move pruning, whenever th...