User authentication and intrusion detection differ from standard classification problems in that while we have data generated from legitimate users, impostor or intrusion data is s...
—This paper describes a new logic-based approach for representing and reasoning about metabolic networks. First it shows how biological pathways can be elegantly represented in a...
Indexes are a well established method of locating information in printed literature just as find is a popular technique when searching in digital documents. However, document reade...
Jennifer Pearson, George Buchanan, Harold W. Thimb...
Content based image retrieval (CBIR) has been well studied in the computer vision and multimedia community. Content free image retrieval (CFIR) methods, and their complementary cha...
Abstract. We present a completely autonomous algorithm for the real-time creation of a moving subject’s kinematic model from optical motion capture data and with no a priori info...