: Frequently, Security Monitoring is equated with network intrusion detection. However, Security Monitoring has a much broader scope. It also comprises detection of insider attacks...
Frederic Majer, Martin Nussbaumer, Dieter Riexinge...
Computer based analysis for automated segmentation of blood vessels in retinal images will help eye care specialists screen larger populations for vessel abnormalities. However, a...
Qin Li, Lei Zhang, David Zhang, Prabir Bhattachary...
Our human body is well protected by antibodies from our biological immune system. This protection system matured over millions of years and has proven its functionality. In our re...
Andreas Pietzowski, Wolfgang Trumler, Theo Ungerer
In many multitarget tracking applications in computer vision, a detection algorithm provides locations of potential targets. Subsequently, the measurements are associated with pre...
Linear techniques are widely used to reduce the dimension of image representation spaces in applications such as image indexing and object recognition. Optimal Component Analysis ...
Yiming Wu, Xiuwen Liu, Washington Mio, Kyle A. Gal...