The possibility of using purely text stream (keyboardenterable) as carrier of malware is under-researched and often underestimated. A text attack can happen at multiple levels, fr...
We propose a preprocessing method for Web mining which, given semi-structured documents with the same structure and style, distinguishes useless parts and non-useless parts in each...
The analysis and characterization of atrial tachyarrhythmias requires the previous estimation of the atrial activity (AA) free from any ventricular activity and other artefacts. Th...
Francisco Castells, Jorge Igual, Vicente Zarzoso, ...
Abstract. While the discovery of structural variants in the human population is ongoing, most methods for this task assume that the genome is sequenced to high coverage (e.g. 40x),...
Traditional cooperative communications can improve communication reliability. However, the simultaneous transmissions from multiple relays are challenging in practice due to the i...