Many real-life graphs such as social networks and peer-topeer networks capture the relationships among the nodes by using trust scores to label the edges. Important usage of such ...
We present automated, real-time models built with machine learning algorithms which use videotapes of subjects' faces in conjunction with physiological measurements to predic...
Jeremy N. Bailenson, Emmanuel D. Pontikakis, Iris ...
The increasing amount of communication between individuals in e-formats (e.g. email, Instant messaging and the Web) has motivated computational research in social network analysis...
Ding Zhou, Eren Manavoglu, Jia Li, C. Lee Giles, H...
Abstract. Intracellular recordings obtained under cutaneous and lemniscal stimulation show that the afferent fibers can establish excitatory and inhibitory synaptic connections w...
Security concerns are becoming increasingly critical in networked systems. Firewalls provide important defense for network security. However, misconfigurations in firewalls are ...
Lihua Yuan, Jianning Mai, Zhendong Su, Hao Chen, C...