Storage-based intrusion detection allows storage systems to transparently watch for suspicious activity. Storage systems are well-positioned to spot several common intruder action...
Adam G. Pennington, John Linwood Griffin, John S. ...
Most communication systems use some form of feedback, often related to channel state information. The common models used in analyses either assume perfect channel state information...
This paper tests the hypothesis that a "universal," data-driven model can be developed based on glucose data from one diabetic subject, and subsequently applied to predic...
Adiwinata Gani, Andrei V. Gribok, Yinghui Lu, W. K...
Discovering unknown adverse drug reactions (ADRs) in postmarketing surveillance as early as possible is of great importance. The current approach to postmarketing surveillance prim...
Yanqing Ji, Hao Ying, Margo S. Farber, John Yen, P...
Four time-frequency and time-scale methods are studied for their ability of detecting myoclonic seizures from accelerometric data. Methods that are used are: the short-time Fourier...
Tamara M. E. Nijsen, Ronald M. Aarts, Pierre J. M....