Our first objective in participating in this domain-specific evaluation campaign is to propose and evaluate various indexing and search strategies for the German, English and Russ...
Hosts infected with malicious software, so called malware, are ubiquitous in today’s computer networks. The means whereby malware can infiltrate a network are manifold and rang...
Konrad Rieck, Guido Schwenk, Tobias Limmer, Thorst...
We have designed and implemented a multi-linear discriminant method of constructing and quantifying statistically significant changes on human identity photographs. The method is...
Carlos E. Thomaz, Vagner do Amaral, Gilson Antonio...
Abstract. This paper extends and generalizes the Bayesian semisupervised segmentation algorithm [1] for oil spill detection using SAR images. In the base algorithm on which we buil...
We consider classification of email messages as to whether or not they contain certain “email acts”, such as a request or a commitment. We show that exploiting the sequential ...