As dynamic connectivity is shown essential for normal brain function and is disrupted in disease, it is critical to develop models for inferring brain effective connectivity from ...
Embedded malware is a recently discovered security threat that allows malcode to be hidden inside a benign file. It has been shown that embedded malware is not detected by commerci...
M. Zubair Shafiq, Syed Ali Khayam, Muddassar Faroo...
Background: Comparative analysis of expression microarray studies is difficult due to the large influence of technical factors on experimental outcome. Still, the identified diffe...
Rob Jelier, Peter A. C. 't Hoen, Ellen Sterrenburg...
The pervasiveness of wireless devices and the architectural organization of wireless networks in distributed communities, where no notion of trust can be assumed, are the main rea...
Svetlana Radosavac, John S. Baras, Iordanis Koutso...
Alignment between the input and target objects has great impact on the performance of image analysis and recognition system, such as those for medical image and face recognition. A...