Learn More
We propose a method for vector field learning with out-liers, called vector field consensus (VFC). It could distinguish inliers from outliers and learn a vector field fitting for the inliers simultaneously. A prior is taken to force the smoothness of the field, which is based on the Tiknonov regularization in vector-valued reproducing kernel Hilbert space.(More)
This paper introduces a class of adaptive Perona-Malik (PM) diffusion, which combines the PM equation with the heat equation. The PM equation provides a potential algorithm for image segmentation, noise removal, edge detection, and image enhancement. However, the defect of traditional PM model is tending to cause the staircase effect and create new features(More)
Multidrug resistance (MDR) is a major obstacle towards a successful treatment of gastric cancer. However, the mechanisms of MDR are intricate and have not been fully understood. To elucidate the molecular mechanisms of MDR in gastric cancer, we employed the proteomic approach of isobaric tags for relative and absolute quantification (iTRAQ), followed by(More)
Complex Event Processing (CEP) over event streams has become increasingly important for real-time applications ranging from healthcare to supply chain management. In such applications, arbitrarily complex sequence patterns as well as non existence of such complex situations must be detected in real time. To assure real-time responsiveness for detection of(More)
Security testing has gained significant attention recently due to frequent attacks against software systems. This paper presents a trace-based security testing approach. It reuses test cases generated from previous testing methods to produce execution traces. An execution trace is a sequence of program statements exercised by a test case. Each trace is(More)
In this paper, a flexible probabilistic method is introduced for non-rigid point registration, which is motivated by the pioneering research named Coherent Point Drift (CPD). Being different from CPD, our algorithm is robust and outlier-adaptive, which does not need prior information about data such as the appropriate outlier ratio when the point sets are(More)
Buffer overflow vulnerabilities are program defects that can cause a buffer to overflow at runtime. Many security attacks exploit buffer overflow vulnerabilities to compromise critical data structures. In this paper, we present a black-box testing approach to detecting buffer overflow vulnerabilities. Our approach is motivated by a reflection on how buffer(More)
BACKGROUND Hepatitis C is a global health problem and represents a major cause of liver disease and socioeconomic burden. Effective antiviral therapy may prevent these complications, but the current treatment for patients with chronic hepatitis C virus (HCV) infection does not produce sustained virologic response. Therefore, identification of the(More)
BACKGROUND The effect of antiviral therapy in chronic hepatitis B (CHB) on reducing the risk of long-term complications (LTCs) remains unclear so far. To study whether long-term nucleos(t)ide analogues therapy can reduce the risk of long-term complications. METHODS We searched MEDLINE, EMBASE, OVID, the Cochrane Central Register of Controlled Trials.(More)