Software attacks often subvert the intended data-flow in a vulnerable program. For example, attackers exploit buffer overflows and format string vulnerabilities to write data to u...
The process of fixation identification--separating and labeling fixations and saccades in eye-tracking protocols--is an essential part of eye-movement data analysis and can have a...
CCTV and sensor based surveillance systems are part of our daily lives now in this modern society due to the advances in telecommunications technology and the demand for better sec...
This paper addresses the problem of automatic temporal
annotation of realistic human actions in video using mini-
mal manual supervision. To this end we consider two asso-
ciate...
Olivier Duchenne, Ivan Laptev, Josef Sivic, Franci...
We tackle the difficult problem of summarizing the path/branching structure and value content of an XML database that comprises both numeric and textual values. We introduce a nov...