We perform host-based intrusion detection by constructing a model from a program’s binary code and then restricting the program’s execution by the model. We improve the effecti...
Jonathon T. Giffin, David Dagon, Somesh Jha, Wenke...
Background: A nanopore detector has a nanometer-scale trans-membrane channel across which a potential difference is established, resulting in an ionic current through the channel ...
This paper proposes a speech comprehension computational model based on neurocognitiveresearches. The computational representation uses techniques as wavelets transform and connec...
A sound source separation technique based on a bio-inspired neural network, capable of functioning in more than two-source mixtures, is proposed. Separation results are compared wi...
Much of the work reported in the first three DSVIS conferences has concentrated on techniques and languages for specifying and developing interactive systems. In this paper, we ar...
Robert E. Fields, Nicholas A. Merriam, Andrew M. D...