Attack graphs are important tools for analyzing security vulnerabilities in enterprise networks. Previous work on attack graphs has not provided an account of the scalability of t...
In this article, we present the algorithms and results of our participation in the medical image annotation and retrieval tasks of ImageCLEFmed 2006. We exploit both global featur...
Jing Liu, Yang Hu, Mingjing Li, Songde Ma, Wei-Yin...
We examine in some detail Mel Frequency Cepstral Coefficients (MFCCs) - the dominant features used for speech recognition - and investigate their applicability to modeling music. ...
Recent advances in functional brain imaging enable identication of active areas of a brain performing a certain function. Induction of logical formulas describing relations betwee...
We propose a technique that makes use of a proximity metric for delineating partially or fully bounded regions of a scanned bitmap that depicts a building floor plan. A proximity...
Kathy Ryall, Stuart M. Shieber, Joe Marks, Murray ...