Modern computing systems generate large amounts of log data. System administrators or domain experts utilize the log data to understand and optimize system behaviors. Most system ...
Named entity recognition aims at extracting named entities from unstructured text. A recent trend of named entity recognition is finding approximate matches in the text with respe...
Wei Wang 0011, Chuan Xiao, Xuemin Lin, Chengqi Zha...
The method of microtubule tracking and dynamics analysis, presented here, improves upon the current means of manual and automated quantification of microtubule behavior. Key contr...
Motaz A. El Saban, Alphan Altinok, Austin J. Peck,...
Abstract-- This paper presents a biometric user authentication based on a person's gait. Unlike most previous gait recognition approaches, which are based on machine vision te...
Intelligibility predictors tell us a great deal about human speech perception, in particular which acoustic factors strongly effect human behavior, and which do not. A particular...
Bryce E. Lobdell, Jont B. Allen, Mark Hasegawa-Joh...