Storage-based intrusion detection allows storage systems to transparently watch for suspicious activity. Storage systems are well-positioned to spot several common intruder action...
Adam G. Pennington, John Linwood Griffin, John S. ...
Spearman’s footrule and Kendall’s tau are two well established distances between rankings. They, however, fail to take into account concepts crucial to evaluating a result set...
We propose a novel energy term to make the curve evolution quite robust to spurious edges. The physical intuition behind the formulation is that an object edge is generally contin...
Heterogeneous distributed computing platforms continue to require substantial effort in terms of software installation and management for efficient use, often necessitating manua...
The Foundation Coalition and others have been working on the development of Concept Inventory (CI) assessment instruments patterned after the well-known Force Concept Inventory...