Identifying the intentions or attempts of the monitored agents through observations is very vital in computer network security. In this paper, a plan recognition method for predict...
Li Feng, Xiaohong Guan, Sangang Guo, Yan Gao, Pein...
Synaptic runaway denotes the formationof erroneous synapses and premature functional decline accompanying activity-dependent learning in neural networks. This work studies synapti...
Abstract. We propose a novel probabilistic framework to merge information from DWI tractography and resting-state fMRI correlations. In particular, we model the interaction of late...
Archana Venkataraman, Yogesh Rathi, Marek Kubicki,...
Huge time-series stream data are collected every day from many areas, and their trends may be impacted by outside events, hence biased from its normal behavior. This phenomenon is ...
Yue Wang, Jie Zuo, Ning Yang, Lei Duan, Hong-Jun L...
Ensuring the consistency and completeness of Semantic Web ontologies is practically impossible, because of their scale and highly dynamic nature. Many web applications, therefore,...