Using data from 43 users across two platforms, we present a detailed look at smartphone traffic. We find that browsing contributes over half of the traffic, while each of email, me...
Previous methods of network anomaly detection have focused on defining a temporal model of what is "normal," and flagging the "abnormal" activity that does not...
Kevin M. Carter, Richard Lippmann, Stephen W. Boye...
Fusion of Magnetic Resonance Imaging (MRI) and Trans Rectal Ultra Sound (TRUS) images during TRUS guided prostate biopsy improves localization of the malignant tissues. Segmented p...
Soumya Ghose, Arnau Oliver, Robert Marti, Xavier L...
Cone-beam computed tomography (CBCT) is an important image modality for dental surgery planning, with high resolution images at a relative low radiation dose. In these scans the ma...
Dirk-Jan Kroon, Cornelis H. Slump, Thomas J. J. Ma...
Abstract--Model checkers for concurrent probabilistic systems have become very popular within the last decade. The study of long-run average behavior has however received only scan...