Outlier detection techniques are widely used in many applications such as credit card fraud detection, monitoring criminal activities in electronic commerce, etc. These application...
In video surveillance, automatic methods for scene understanding and activity modeling can exploit the high redundancy of object trajectories observed over a long period of time. ...
The aim of this work is to devise an effective method for static summarization of home video sequences. Based on the premise that the user watching a summary is interested in peop...
Email worms continue to be a persistent problem, indicating that current approaches against this class of selfpropagating malicious code yield rather meagre results. Additionally,...
Background: A central challenge in the molecular diagnosis and treatment of cancer is to define a set of molecular features that, taken together, distinguish a given cancer, or ty...
Kamesh Munagala, Robert Tibshirani, Patrick O. Bro...