By using database security metrics to evaluate how risky the current database environment is and visually displaying the metric results on graphs, database security visualization ...
—To overcome the drawbacks of the Mobile IPv6 protocol on handling local mobility management, IETF proposed the HMIPv6 protocol which introduces an intermediate mobility anchor p...
We present a term recognition approach to extract acronyms and their definitions from a large text collection. Parenthetical expressions appearing in a text collection are identif...
We proposed a subword-based tagging for Chinese word segmentation to improve the existing character-based tagging. The subword-based tagging was implemented using the maximum entr...
To compare sample data from x-ray diffraction a suitable metric is developed to evaluate the similarity (or dissimilarity) between samples and to compare it to a references. The m...
George Runger, Kelly Canter, John Twist, David Ros...