This work investigates three aspects: (a) a network vulnerability as the non-uniform vulnerable-host distribution, (b) threats, i.e., intelligent malwares that exploit such a vulne...
Signal modeling lies at the core of numerous signal and image processing applications. A recent approach that has drawn considerable attention is sparse representation modeling, in...
In an effort to better understand the underrepresentation of women within the IT profession, one promising line of investigation is the influence of factors in the socio-cultural ...
Eileen M. Trauth, Jeria L. Quesenberry, Benjamin Y...
In the last few decades, several studies have found the same technology implemented in highly similar organizational settings to be associated with very different consequences for...
Background: An important challenge in eukaryotic gene prediction is accurate identification of alternatively spliced exons. Functional transcripts can go undetected in gene expres...