Most of the work on 3-D object recognition from range data has used an alignment-verification approach in which a specific 3-D object is matched to an exact instance of the same o...
Salvador Ruiz-Correa, Linda G. Shapiro, Marina Mei...
This paper describes an efficient pedestrian detection system for videos acquired from moving platforms. Given a detected and tracked object as a sequence of images within a bound...
Yang Ran, Qinfen Zheng, Isaac Weiss, Larry S. Davi...
The mean of a data set is one trivial representation of data from one class. Recently, mutual interdependence analysis (MIA) has been successfully used to extract more involved re...
— As Internet worms become ever faster and more sophisticated, it is important to be able to extract worm signatures in an accurate and timely manner. In this paper, we apply mac...
Stewart M. Yang, Jianping Song, Harish Rajamani, T...
Software security assurance and malware (trojans, worms, and viruses, etc.) detection are important topics of information security. Software obfuscation, a general technique that ...
Andrew H. Sung, Jianyun Xu, Patrick Chavez, Sriniv...