Security defense tools like firewalls and antivirus softwares are not sufficient to defend against dynamic threats to database systems. Successful attacks could not only seriously ...
Impact assessment (IA) is a key method for the legislator to evaluate policies, norms or regulations currently under development. Experts use IA to gather and analyze input from m...
Image data is as common as textual data in this digital world. There is an urgent demand of image management tools as efficient as those text search engines. Decades of research on...
A large number of algorithms have been developed to perform non-rigid registration and it is a tool commonly used in medical image analysis. The FreeForm Deformation algorithm is ...
Marc Modat, Gerard R. Ridgway, Zeike A. Taylor, Ma...
Coreferencing entities across documents in a large corpus enables advanced document understanding tasks such as question answering. This paper presents a novel cross document core...
Jian Huang 0002, Sarah M. Taylor, Jonathan L. Smit...