We present a 3D brain MRI segmentation method in which a high resolution label image evolves under the influence of multiple constraints. The constraints are expressed in a versat...
Retrofitting security implementations to a released software-intensive system or to a system under development may require significant architectural or coding changes. These late...
Many network intrusion detection systems (NIDS) use byte sequences as signatures to detect malicious activity. While being highly efficient, they tend to suffer from a high false...
Appropriately selected materialized views (also called indexed views) can speed up query execution by orders of magnitude. Most database systems limit support for materialized vie...
This Paper introduces PKUSpace - a collaborative platform for scientific learning and researching. Supported by efficient automated metadata extraction and powerful text classifica...
Ming Zhang, Dongqing Yang, Zhi-Hong Deng, Ying Fen...