Current Intrusion Detection Systems (IDS) examine all data features to detect intrusion or misuse patterns. Some of the features may be redundant or contribute little (if anything)...
We introduce two fourth-order regularization methods that remove geometric noise without destroying significant geometric features. These methods leverage ideas from image denoisi...
This paper proposes an extension to the active contour algorithm for the detection of linear patterns within remote sensing and vibration data. The proposed technique uses an alte...
Minimizing the number of computations a low-power device makes is important to achieve long battery life. In this paper we present a framework for a low-power device to minimize t...
This paper presents a content-based approach for temporal segmentation of videos. Tracked objects are characterized by their 2D trajectories which are used in a meaningful way to ...
Alexandre Hervieu, Patrick Bouthemy, Jean-Pierre L...