Security analysis should take advantage of a reliable knowledge base that contains semantically-rich information about a protected network. This knowledge is provided by network m...
Giovanni Vigna, Fredrik Valeur, Jingyu Zhou, Richa...
Computationally identifying transcription factor binding sites in the promoter regions of genes is an important problem in computational biology and has been under intensive resea...
Large efforts have been made for general applications of content-based image retrieval (CBIR). Established CBIRsystems globally evaluate color, texture, and also shape for retriev...
Thomas Martin Lehmann, Berthold B. Wein, Daniel Ke...
The success of the Semantic Web depends both on the definition of ontologies used to represent the knowledge as on the annotations performed of the web contents. As manual approach...
In most volume rendering scenarios implicit classification is performed manually by specification of a transfer function, that maps abstract data values to visual attributes. An a...