Information security has become a cause of concern because of the electronic eavesdropping. Capacity, robustness and invisibility are important parameters in information hiding and...
R. Amirtharajan, Sandeep Kumar Behera, Motamarri A...
With the ever increasing deployment and usage of gigabit networks, traditional network anomaly detection based Intrusion Detection Systems (IDS) have not scaled accordingly. Most,...
This paper presents an intelligent scissoring operator for meshes. Unlike common approaches that segment a mesh using clustering schemes, we introduce a method that concentrates o...
Yunjin Lee, Seungyong Lee, Ariel Shamir, Daniel Co...
Abstract. We describe a new approach for learning to perform classbased segmentation using only unsegmented training examples. As in previous methods, we first use training images ...
Recent advances in wireless communications and positioning devices have generated a tremendous amount of interest in the continuous monitoring of spatial queries. However, such app...