Background: Yu et al. (BMC Bioinformatics 2007,8: 145+) have recently compared the performance of several methods for the detection of genomic amplification and deletion breakpoin...
We consider the communication scenario where a source-destination pair wishes to keep the information secret from a relay node despite wanting to enlist its help. For this scenario...
Given a snapshot of a social network, can we infer which new interactions among its members are likely to occur in the near future? We formalize this question as the link predicti...
Many HCI researchers have recently begun to examine the opportunities to use ICTs to promote environmental sustainability and ecological consciousness on the part of technology us...
This study questions the traditional view of software architecture as a specification that needs only be understood by software architects and engineers. Based on an intensive stu...