Passwords are ubiquitous, and users and service providers alike rely on them for their security. However, good passwords may sometimes be hard to remember. For years, security pra...
Markus Jakobsson, Erik Stolterman, Susanne Wetzel,...
Abstract—Multicast-based network tomography enables inference of average loss rates and delay distributions of internal network links from end-to-end measurements of multicast pr...
Sequential pattern mining is an active field in the domain of knowledge discovery. Recently, with the constant progress in hardware technologies, real-world databases tend to gro...
Abstract. In the biometric field, different experts are combined to improve the system reliability, as in many application the performance attained by individual experts (i.e., d...
Abstract. We have been developing an approach for automatically quantifying organ motion for adaptive radiation therapy of the prostate. Our approach is based on deformable image r...
B. C. Davis, Mark Foskey, Julian Rosenman, L. Goya...