Computer users express a strong desire to prevent attacks and to reduce the losses from computer and information security breaches. However, security compromises are common and wi...
We present an interactive system to query, explore and navigate data according to a hierarchical knowledge model that had been automatically populated from unstructured textual da...
Anni Coden, Igor L. Sominsky, Michael A. Tanenblat...
Placement of Implantable Cardiac Defibrillator (ICD) leads in children and some adults is challenging due to anatomical factors. As a result, novel ad hoc non-transvenous implant t...
Matthew Jolley, Jeroen Stinstra, David M. Weinstei...
Abstract. Deformable image registration in the presence of considerable contrast differences and large-scale size and shape changes represents a significant challenge for image r...
Linh K. Ha, Marcel Prastawa, Guido Gerig, John H. ...
Sensor networks are expected to evolve into long-lived, autonomous networked systems whose main mission is to provide in-situ users ? called actors ? with real-time information in...
Ferruccio Barsi, Alfredo Navarra, Maria Cristina P...