Abstract--The open wireless medium in a mobile ad-hoc network (MANET) enables malicious traffic analysis to dynamically infer the network traffic pattern in hostile environments. T...
Video Content is always huge by itself with abundant information. Extracting explicit semantic information has been extensively investigated such as object detection, structure an...
Concurrent program verification is challenging because it involves exploring a large number of possible thread interleavings together with complex sequential reasoning. As a resul...
Software systems are complex and difficult to analyze. Reengineering is a complex activity that usually involves combining different techniques and tools. Moose is an reengineerin...
This work describes and compares two different methods for identifying growth patterns in preterm infants during the second year of development. One method is based on creating an...
Paul Aljabar, Kanwal K. Bhatia, Joseph V. Hajnal, ...