—Many factors are believed to increase the vulnerability of software system; for example, the more widely deployed or popular is a software system the more likely it is to be att...
Thomas Zimmermann, Nachiappan Nagappan, Laurie A. ...
The proliferation of complex and fast-spreading intrusions not only requires advances in intrusion detection mechanisms but also demands development of sophisticated and automated...
Abstract. This paper deals with the CLEAR 2007 evaluation on the detection of acoustic events which happen during seminars or meetings The implemented system consists in a front-en...
Background: The main goal of the PROMISE repository is to enable reproducible, and thus verifiable or refutable research. Over time, plenty of data sets became available, especial...
Dynamic cardiac metrics, including myocardial strains and displacements, provide a quantitative approach to evaluate cardiac function. However, in current clinical diagnosis, larg...