In this paper, we examine the use of implicit shape representations for nonrigid registration of serial CT liver examinations. Using ground truth in the form of corresponding land...
Nathan D. Cahill, Grace Vesom, Lena Gorelick, Joan...
Protocol conversion involves the use of a converter to control communication between two or more protocols such that desired system-level specifications can be satisfied. We invest...
Abstract. The vision of semantic business processes is to enable the integration and inter-operability of business processes across organizational boundaries. Since different orga...
Christoph Kiefer, Abraham Bernstein, Hong Joo Lee,...
Abstract— Despite the emergence of voice over IP and videoconferencing services, recent studies have shown that the Internet still may not provide acceptable quality for interact...
Fernando Silveira Filho, Edson H. Watanabe, Edmund...
Intrusion detection (ID) is one of network security engineers' most important tasks. Textual (command-line) and visual interfaces are two common modalities used to support en...
Ramona Su Thompson, Esa M. Rantanen, William Yurci...