Intrusion detection system (IDS) has become an essential component of a computer security scheme as the number of security-breaking attempts originating inside organizations is in...
Mohamad A. Eid, Hassan Artail, Ayman I. Kayssi, Al...
Abstract. This paper describes a method for automatic contour detection in long-axis cardiac MRI using an adaptive virtual exploring robot. The robot is a simulated trained virtual...
Mark Blok, Mikhail G. Danilouchkine, Cor J. Veenma...
This paper describes how to automatically extract the presence and location of geometrical irregularities on a surface of revolution. To this end a partial 3D scan of the workpiec...
Kasper Claes, Thomas P. Koninckx, Herman Bruyninck...
In this paper, we present a novel near-duplicate document detection method that can easily be tuned for a particular domain. Our method represents each document as a real-valued s...
Hannaneh Hajishirzi, Wen-tau Yih, Aleksander Kolcz
In this paper, we present a system for simultaneous tracking of multiple persons in a smartroom using multiple cameras. Robust person tracks are created, continuously adapted, and...
Keni Bernardin, Alexander Elbs, Rainer Stiefelhage...