The popularity of computer networks broadens the scope for network attackers and increases the damage these attacks can cause. In this context, Intrusion Detection Systems (IDS) a...
We present a method for picture detection in document page images, which can come from scanned or camera images, or rendered from electronic file formats. Our method uses OCR to s...
Anomaly detection is an important data mining task. Most existing methods treat anomalies as inconsistencies and spend the majority amount of time on modeling normal instances. A r...
We propose an approach for detecting objects in large-scale range datasets that combines bottom-up and top-down processes. In the bottom-up stage, fast-to-compute local descriptors...
Alexander Patterson, Philippos Mordohai, Kostas Da...
Optical mark sensing, i.e., detecting whether a "bubble" has been filled in, may seem straightforward. However, on US election ballots the shape, intensity, size and pos...
Daniel P. Lopresti, Elisa H. Barney Smith, George ...